Introduction


Many networks require that you control connectivity to network resources in some way. It does not matter if the user is an internal user who is accessing corporate resources or external routers or a network administrator who is accessing networking equipment. You must establish security parameters not only to verify the identity of the user creating a session, but also to ensure that the user has permission to access a particular resource. Logging the activities of users when they access specific resources is also an important aspect of security. In this chapter, we discuss one of the mechanisms to identify a user, grant permissions to a user's session, and log the user 's activities. The method that we discuss is AAA.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net