Yeah, that is the book. I could not find any reference on DocCD. But
really, if you look into failed logs on ACS it will tell you what it is
after. You probably need to set it up 2-3 times during your preps and you
should be able to figure out on the spot if you get such a task on the lab.

A.

On 23 July 2012 15:53, Karthik sagar <[email protected]> wrote:

> This method of CTP/Tacacs authorization is called ' Classic Authorization
> ' and I agree, it is the recommended way to do CTP authorization with
> tacacs. I learnt this method from a book "AAA identity Management Security"
> (Chapter 10: Cut-through Proxy ).
>
> However, is the procedure mentioned anywhere in Cisco Docs ?
>
> Regards,
> Karthik
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to