This method of CTP/Tacacs authorization is called ' Classic Authorization ' and I agree, it is the recommended way to do CTP authorization with tacacs. I learnt this method from a book "AAA identity Management Security" (Chapter 10: Cut-through Proxy ).
However, is the procedure mentioned anywhere in Cisco Docs ? Regards, Karthik
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
