Introduction

Many networks require that you control connectivity to network resources in some way. It does not matter if the user is an internal user who is accessing corporate resources or external routers or a network administrator who is accessing networking equipment. You must establish security parameters not only to verify the identity of the user creating a session, but also to ensure that the user has permission to access a particular resource. Logging the activities of users when they access specific resources is also an important aspect of security. In this chapter, we discuss one of the mechanisms to identify a user, grant permissions to a user's session, and log the user's activities. The method that we discuss is AAA.

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.