virtual telnet and http is required for non-telnet/http/ftp applications.

Auth-proxy, mostly that is the way it will be asked.

With regards
Kings


On Sun, Jun 10, 2012 at 6:52 AM, Mike Rojas <[email protected]> wrote:

>  Hello All,
>
> I have a mayor doubt in regards when you have to configure either CTP or
> Auth-Proxy. I've seen the question formulated 10 thousand times, but they
> all differ in the solution and on the  methods to accomplish it. For
> example, when they ask you to do things like:
>
> 1-Make sure that the client authenticates before gathering access to the
> internal network (CTP)
>   Now, I can use either Virtual HTTP, Virtual Telnet or Match command...
> which one do I use?
>
> On this same one, if using match command, I need to allow something in
> within the interesting traffic so CTP can catch it right?  If so, which
> traffic any http? To specific one host?
>
> 2-Allow traffic after being authenticated to the Network x and y
> (Auth-Proxy)
>  I've seen many exercises when they put an ACL on the interface denying
> all the traffic and just permitting one specific type of traffic in order
> to trigger the Auth-proxy, shall I use this approach or match the traffic
> they ask using a triggering acl?
>
> Thanks in advanced.
>
> Mike
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
> Are you a CCNP or CCIE and looking for a job? Check out
> www.PlatinumPlacement.com
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to