Contents
xxvi
Cisco ASA 5500 Series Configuration Guide using the CLI
Differentiating User Roles Using AAA 35-28
Using Local Authentication 35-28
Using RADIUS Authentication 35-29
Using LDAP Authentication 35-29
Using TACACS+ Authentication 35-30
Monitoring AAA Servers 35-30
Additional References 35-31
RFCs 35-31
Feature History for AAA Servers 35-31
CHAPTER
36 Configuring the Identity Firewall 36-1
Information About the Identity Firewall 36-1
Overview of the Identity Firewall 36-1
Architecture for Identity Firewall Deployments 36-2
Features of the Identity Firewall 36-3
Deployment Scenarios 36-4
Cut-through Proxy and VPN Authentication 36-7
Licensing for the Identity Firewall 36-8
Guidelines and Limitations 36-8
Prerequisites 36-9
Configuring the Identity Firewall 36-10
Task Flow for Configuring the Identity Firewall 36-10
Configuring the Active Directory Domain 36-11
Configuring Active Directory Agents 36-13
Configuring Identity Options 36-14
Configuring Identity-based Access Rules 36-20
Configuring Cut-through Proxy Authentication 36-22
Configuring VPN Authentication 36-24
Monitoring the Identity Firewall 36-25
Monitoring AD Agents 36-26
Monitoring Groups 36-26
Monitoring Memory Usage for the Identity Firewall 36-26
Monitoring Users for the Identity Firewall 36-27
Feature History for the Identity Firewall 36-28
CHAPTER
37 Configuring Management Access 37-1
Configuring ASA Access for ASDM, Telnet, or SSH 37-1
Licensing Requirements for ASA Access for ASDM, Telnet, or SSH 37-2