Summary

After reading this chapter, you will understand AAA components and the configuration of AAA in relation to the FWSM. Fallback support should be added when the AAA access solution for the FWSM is designed. You will know the difference between TACACS+ and RADIUS and the different security protocols supported in the FWSM. The concept of cut-through proxy is covered with configuration examples.

Chapter

Was this article helpful?

0 0

Post a comment