Security: Cisco ASA Cut-through proxy

Introduction Cisco ASA will authenticate the user attempting to access the asset that is protected by Cisco ASA, after user authenticated Cisco ASA will pass the credential to TACACS+ or RADIUS. The Cisco ASA is the authenticator and the user is supplicant, this is known as cut-through proxy. Application An example scenario that user can … Continue reading Security: Cisco ASA Cut-through proxy