Cisco Cisco ASA 5525-X Adaptive Security Appliance 문제 해결 가이드

다운로드
페이지 6
Cut−Through and Direct ASA Authentication
Configuration Example
Document ID: 113363
Contributed by Blayne Dreier, Cisco TAC Engineer.
Jan 13, 2012
Contents
Introduction
 Prerequisites
      Requirements
      Components Used
      Conventions
 Cut−Through
 Direct Authentication
 Related Information
Introduction
This document describes how to configure cut−through and direct ASA authentication.
Prerequisites
Requirements
There are no specific requirements for this document.
Components Used
The information in this document is based on the Cisco Adaptive Security Appliance (ASA).
The information in this document was created from the devices in a specific lab environment. All of the
devices used in this document started with a cleared (default) configuration. If your network is live, make sure
that you understand the potential impact of any command.
Conventions
Refer to Cisco Technical Tips Conventions for more information on document conventions.
Cut−Through
Cut−through authentication was previously configured with the aaa authentication include command. Now,
the aaa authentication match command is used. Traffic that requires authentication is permitted in an access
list that is referenced by the aaa authentication match command, which causes the host to be authenticated
before the specified traffic is allowed through the ASA.
Here is a configuration example for web traffic authentication:
username cisco password cisco privilege 15