This method of CTP/Tacacs authorization is called ' Classic Authorization '
and I agree, it is the recommended way to do CTP authorization with tacacs.
I learnt this method from a book "AAA identity Management Security"
(Chapter 10: Cut-through Proxy ).

However, is the procedure mentioned anywhere in Cisco Docs ?

Regards,
Karthik
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to