O'Reilly logo

CCNP Security FIREWALL 642-618 Official Cert Guide by Anthony Sequeira, Dave Garneau, David Hucaby

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Using Proxy Services to Control Access

This chapter covers the following topics:

User-Based (Cut-Through) Proxy Overview: This section defines this feature and provides an overview of the process on the Cisco ASA.

AAA on the ASA: This section reviews the various roles that AAA can accommodate for the ASA.

User-Based Proxy Preconfiguration Steps and Deployment Guidelines: This section provides expert guidance for deploying the cut-through proxy feature in enterprise environments.

Direct HTTP Authentication with the Cisco ASA: This section explains why this option might be required in an enterprise environment, and details the required configuration.

Direct Telnet Authentication: This section describes the option of direct ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required