Drag and Drop

Drag and Drop
Drag and drop the methods supported by the aaa authorization command from me left onto me correct descriptions on the right.
Select and Place:

cisco-exams

2 thoughts on “Drag and Drop

  1. group radius 5
    groups tacacs+ 6
    if-authenticated 1
    krb5-instance 4
    local 3
    none 2

    https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-cfg-authorizatn.html

    AAA Authorization Methods
    AAA supports five different methods of authorization:

    TACACS+—The network access server exchanges authorization information with the TACACS+ security daemon. TACACS+ authorization defines specific rights for users by associating attribute-value pairs, which are stored in a database on the TACACS+ security server, with the appropriate user.

    If-Authenticated—The user is allowed to access the requested function provided the user has been authenticated successfully.

    None—The network access server does not request authorization information; authorization is not performed over this line/interface.

    Local—The router or access server consults its local database, as defined by the username command, for example, to authorize specific rights for users. Only a limited set of functions can be controlled via the local database.

    RADIUS—The network access server requests authorization information from the RADIUS security server. RADIUS authorization defines specific rights for users by associating attributes, which are stored in a database on the RADIUS server, with the appropriate user.

    https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-cfg-authentifcn.html

    krb5
    Uses Kerberos 5 for authentication (can only be used for PAP authentication).

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.