This chapter covers the following subjects:
• Configuration Procedures, Deployment Strategies, and Information Gathering: This section covers what to consider when deciding whether to deploy an internal AAA server for authorization.
• Configuring Local and Remote Group Policies: This section discusses the differences between ASA local and remote group policies and the configuration required on the ASA for the deployment of each.
• Accounting Methods for Operational Information: This section reviews the accounting methods available on the ASA for connection and user information gathering.
In earlier chapters, you learned how to plan for and configure the various authentication mechanisms available ...