Configuring Authentication Proxy

Obviously, given the way authentication proxy operates, you need to apply authentication proxy to the correct interface or interfaces to intercept traffic. Further, because authentication proxy dynamically creates ACL entries, you can have extremely strict ACLs on interfaces that will be overridden when a user successfully authenticates.

In the next several sections, we walk you through the necessary configurations for a successful authentication proxy implementation. Please remember that you must configure the IOS Firewall and an AAA server to use authentication proxy.

Enabling Authentication Proxy on CSACS

The first step to configuring the Cisco AAA server, CSACS, is to define groups and the users who will be ...

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.