AAA, 251-81
accounting controls, 256-57
approval process, 260-62
attribute-value pairs, 261
authentication controls, 253-55
authentication protocols, 262-64
authentication transactions, 262
authorization controls, 255-56
authorization transactions, 262
dynamic access lists, 281-82
how it works, 259-60
lock-and-key using local user database, 282-83
methods and types, 265-78
modularity, 253-57
overview of, 252-53
RADIUS, 257-59, 278-81
TACACS+, 257-59, 278-81
trends leading to client-server security systems, 257
Abstraction layer, 33
Access control lists (ACL), 90, 292
reflexive, 296
Access devices, 286
Access LANs, 39
Access layer, 16, 18
Access list traffic-based security, 247
Access point configuration, 355-67
Access routers, 250, 329-31
Access servers, 5, 9, 249-51
Accounting, 252
controls, 256-57
methods and types, 274-78
notice, 276
Adaptive Security Algorithm (ASA), 312-18
Adaptive Security Appliance (ASA), 319-21
Address management, 234-35
Address space, 597
Addressing
Fast Step, 183-84
multicast, 82
types of, 81-82
unicast, 81
Administrative control, 289, 499
Aironet Desktop Utility (ADU), 367
Analog/modem circuits, 49
Application, 56
layer firewalls, 298
protocols, 8
Architectures, 33-34
Ethernet, 40-41
FDDI, 46-47
internetworking, 578
routing protocol, 495-99
WLAN, 339
ARP (Address Resolution Protocol) table, 233
ASCII, 264
ATM (Asynchronous Transfer Mode), 17, 26, 39, 41, 44-45, 210, 216, 583, 611
Attribute-value pairs, 261
Authentication, 252
controls, 253-55
methods, 267-70, 366
protocols, 262-64
transactions, 262
Authentication, authorization, and accounting. See AAA
AutoDetect Device Wizard, 178-79
Auxiliary (AUX) ports, 101, 142