Chapter 13. Authentication, Authorization, and Accounting

On completion of this chapter, you will be able to perform the following tasks:

  • Define authentication, authorization, and accounting (AAA).

  • Describe the differences between authentication, authorization, and accounting.

  • Describe how users authenticate to the PIX Firewall.

  • Describe how cut-through proxy technology works.

  • Name the AAA protocols supported by the PIX Firewall.

  • Install and configure Cisco Secure Access Control Server (CSACS) for Windows NT.

  • Define and configure downloadable access control lists (ACLs).

  • Configure AAA on the PIX Firewall.

AAA is a set of services that the PIX Firewall and other networking devices use to provide secure access to the device itself or various other network ...

Get CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA), Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.