virtual telnet and http is required for non-telnet/http/ftp applications. Auth-proxy, mostly that is the way it will be asked.
With regards Kings On Sun, Jun 10, 2012 at 6:52 AM, Mike Rojas <[email protected]> wrote: > Hello All, > > I have a mayor doubt in regards when you have to configure either CTP or > Auth-Proxy. I've seen the question formulated 10 thousand times, but they > all differ in the solution and on the methods to accomplish it. For > example, when they ask you to do things like: > > 1-Make sure that the client authenticates before gathering access to the > internal network (CTP) > Now, I can use either Virtual HTTP, Virtual Telnet or Match command... > which one do I use? > > On this same one, if using match command, I need to allow something in > within the interesting traffic so CTP can catch it right? If so, which > traffic any http? To specific one host? > > 2-Allow traffic after being authenticated to the Network x and y > (Auth-Proxy) > I've seen many exercises when they put an ACL on the interface denying > all the traffic and just permitting one specific type of traffic in order > to trigger the Auth-proxy, shall I use this approach or match the traffic > they ask using a triggering acl? > > Thanks in advanced. > > Mike > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > Are you a CCNP or CCIE and looking for a job? Check out > www.PlatinumPlacement.com >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
