Yeah, that is the book. I could not find any reference on DocCD. But really, if you look into failed logs on ACS it will tell you what it is after. You probably need to set it up 2-3 times during your preps and you should be able to figure out on the spot if you get such a task on the lab.
A. On 23 July 2012 15:53, Karthik sagar <[email protected]> wrote: > This method of CTP/Tacacs authorization is called ' Classic Authorization > ' and I agree, it is the recommended way to do CTP authorization with > tacacs. I learnt this method from a book "AAA identity Management Security" > (Chapter 10: Cut-through Proxy ). > > However, is the procedure mentioned anywhere in Cisco Docs ? > > Regards, > Karthik >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
