DRAG DROP

DRAG DROP
Drag and drop the methods supported by the aaa accounting command from the left onto the correct descriptions on the right.
Select and Place:

cisco-exams

4 thoughts on “DRAG DROP

  1. auth-proxy 2
    commands 5
    connection 3
    exec 6
    network 4
    resource 1

    https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-cfg-accountg.html
    https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-cfg-authorizatn.html

    Network–Provides information for all PPP, SLIP, or ARAP sessions, including packet and byte counts.

    EXEC–Provides information about user EXEC terminal sessions of the network access server.

    Command–Provides information about the EXEC mode commands that a user issues. Command accounting generates accounting records for all EXEC mode commands, including global configuration commands, associated with a specific privilege level.

    Connection–Provides information about all outbound connections made from the network access server, such as Telnet, local-area transport (LAT), TN3270, packet assembler/disassembler (PAD), and rlogin.

    Resource–Provides “start” and “stop” records for calls that have passed user authentication, and provides “stop” records for calls that fail to authenticate.

  2. auth-proxy 2
    commands 5
    connection 3
    exec 6
    network 4
    resource 1

    https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-cfg-accountg.html

    Accounting method lists are specific to the type of accounting being requested. AAA supports six different types of accounting:

    Network–Provides information for all PPP, SLIP, or ARAP sessions, including packet and byte counts.

    EXEC–Provides information about user EXEC terminal sessions of the network access server.

    Command–Provides information about the EXEC mode commands that a user issues. Command accounting generates accounting records for all EXEC mode commands, including global configuration commands, associated with a specific privilege level.

    Connection–Provides information about all outbound connections made from the network access server, such as Telnet, local-area transport (LAT), TN3270, packet assembler/disassembler (PAD), and rlogin.

    System–Provides information about system-level events.

    Resource–Provides “start” and “stop” records for calls that have passed user authentication, and provides “stop” records for calls that fail to authenticate.

    https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-cfg-authorizatn.html

    To create a method list to enable authorization that applies specific security policies on a per-user basis, use the auth-proxy keyword. For detailed information on the authentication proxy feature, refer to the chapter “Configuring Authentication Proxy” in the “Traffic Filtering and Firewalls” part of this book.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.