teensnoob.blogg.se

Aaa accounting exec cisco secure access control system
Aaa accounting exec cisco secure access control system













aaa accounting exec cisco secure access control system

There are two modes that are available for access. It is up to the systems administrator to decide on these facilities. This facility provides a great amount of flexibility. It is possible that either authorization or accounting or both be used. The processes authorization and accounting are made to work only after the first stage of authentication has been cleared. Generally accounting pertains to information about the user, the nature of service used, the beginning of the service and the end of it. It maintains a track of the resources consumed by various users. It maintains a complete record of what the user did while he was logged on the system. It is a means to check what the user does once he is authorized to have access to the network. Security information is collected under this and can in turn be used for billing, reporting and even auditing. Accounting : This is the last ‘A’ and it stands for accounting.Access privileges generally pertain to usage of services like IP address filtering, address assignment, quality of service, compulsory tunneling etc. In the Cisco IOS, AAA authorization can be done with a name list authorization method. At this stage IP addresses may also be issued as in the case of using VPN. The criterion of determining is the access policy that is specified for specific entities. It is the process of granting or refusing access to services provided on the network. What all a user is determined to access on the network is determined by authorization. Authorization: After authentication is done it is time for authorization.The credentials are verified using passwords and digital certificates. It can also be configured to support encryption depending on the security options that are selected. This challenges the user for a response before allowing the user access to the network. The entity which is seeking access is the client and the one verifying the credentials is the server. This component answers the question ‘who you are?’ It also does the purpose of determining whether the user is the person he claims to be. Authentication: This is used to identify users by login identification and a password.The functional components that AAA intends to provide: The entire concept is based on modular architecture, that is, Authentication, Authorization and Accounting. AAA ensures a security system which is systematic and scalable.

aaa accounting exec cisco secure access control system

Unauthorized access, dialups and internet environments are potential set ups for network trespassers to gain access to sensitive network, services and equipments.

aaa accounting exec cisco secure access control system

AAA provides security with a scalability degree which is higher than line-level and privileged-EXEC authentication.















Aaa accounting exec cisco secure access control system