Implementing Non-AAA Authentication
Protecting who can access your router and make changes is an important topic. This chapter speciﬁcally tackles non-AAA authentication techniques. Cisco resolutely advocates the use of AAA security service, which this book covers in Chapters 7 through 10. The controls offered in this chapter cannot compare with the secure use of a protocol such as Kerberos. But any protection is better than no protection; so let us get started.