-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Monday, July 17, 2000 4:40 PM
> 
> The mechanism that allows the user to log is transparent.. 
> The user has no 
> clue that they are being authenticated by RADIUS or TACACS, 
> and that their 
> session is kerberized.
> 
> The users do not login to Citrix via telnet.

No shit. I know that they do not use telnet to login to Citrix. But
how, if not using telnet or similar, do they authenticate against the
Cisco firewall? 

Earlier you wrote:
> 1. The user on Host A initiates a Kerberized application (such as
> Telnet)  
to Host B.

So if the users initiates a Kerberized application, what does the
user do? Is it that hard for you to describe that?

Geez indeed...

Regards,
Frank



-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.1
Comment: PGP or S/MIME (X.509) encrypted email preferred.

iQA/AwUBOXO2O0RKym0LjhFcEQLXtwCdEdr8RzxFJV5I0LZQLP73+xPgrZAAoNZ2
oybUYnd75kSH+ppfhrrvaf/y
=tB3h
-----END PGP SIGNATURE-----
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to