Summary

This section covered authentication, authorization, and accounting (also known as AAA, or the triple-A services) on the ASA. We started with an overview of the roles for AAA before moving on and discussing how to configure a local user database and remote-user database.

We ended this section by discussing how to configure the authentication proxy service on the ASA. This service allows the ASA to dynamically permit or deny user access to a service based on authentication credentials, and it offers another useful layer of security between the network and the users.

In the next section, we look at some more advanced features of the ASA, and cover such things as threat detection, the Modular Policy Framework, and transparent firewalling.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.151.126