Hello All, I have a mayor doubt in regards when you have to configure either CTP or Auth-Proxy. I've seen the question formulated 10 thousand times, but they all differ in the solution and on the methods to accomplish it. For example, when they ask you to do things like:
1-Make sure that the client authenticates before gathering access to the internal network (CTP) Now, I can use either Virtual HTTP, Virtual Telnet or Match command... which one do I use? On this same one, if using match command, I need to allow something in within the interesting traffic so CTP can catch it right? If so, which traffic any http? To specific one host? 2-Allow traffic after being authenticated to the Network x and y (Auth-Proxy) I've seen many exercises when they put an ACL on the interface denying all the traffic and just permitting one specific type of traffic in order to trigger the Auth-proxy, shall I use this approach or match the traffic they ask using a triggering acl? Thanks in advanced. Mike
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com