chapter  6
31 Pages

Implementing Non-AAA Authentication

Protecting who can access your router and make changes is an important topic. This chapter specifically tackles non-AAA authentication techniques. Cisco resolutely advocates the use of AAA security service, which this book covers in Chapters 7 through 10. The controls offered in this chapter cannot compare with the secure use of a protocol such as Kerberos. But any protection is better than no protection; so let us get started.