O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Setting up Authorization

Setting up authorization is similar to setting up authentication. For authorization to function, authentication needs to be set up first and must be functional. After authentication has been set up, setting up authorization consists of setting up an authorization method list and then applying it to an interface or line (if it is not defined as the default method list). Please note that just like the default authentication method list, the default authorization method list is automatically applied to all interfaces and lines unless there is another named method list defined and specifically applied to a line or interface. In this case the named method list, applied to the line or interface, takes precedence over a default ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required