Author: David Wolsefer
Focus: Remote Access, CCIE R&S; & CCIE Security
Issue Date: Feb 19, 2023
|

 |
 |
Tell a friend about this Study Guide
|
 |
 |
|
 |
 |
 |
Authentication, Authorization, and Accounting (AAA) Protocols
The preferred method for controlling access to networking devices in a large deployment situation is to use an Authentication, Authorization, and Accounting or AAA protocol such as Radius, Tacacs, or Kerberos. AAA is an important topic to master both from a practical real-world sense and from a CCIE perspective. This Study Guide provides an overview of AAA protocols including what they are, why they are used, and how they are implemented.
|