What three configuration options can be executed by navigating to the WCS Administration > AAA menu?

What three configuration options can be executed by navigating to the WCS Administration > AAA
menu? (Choose three.)

What three configuration options can be executed by navigating to the WCS Administration > AAA
menu? (Choose three.)

A.
Add a Lobby Ambassador guest

B.
Add a LDAP server

C.
Add an administrative user

D.
Add a MAC address list filter

E.
Add a RADIUS server

F.
Add a TACAS+ server



Leave a Reply 4

Your email address will not be published. Required fields are marked *


nephelai

nephelai

admin – radius – tacas

daz

daz

TACACS+ is a security application that provides centralized validation of users attempting to gain access to a router or network access server. TACACS+ services are maintained in a database on a TACACS+ daemon running, typically, on a UNIX or Windows NT workstation. You must have access to and must configure a TACACS+ server before the configured TACACS+ features on your network access server are available.

TACACS+ provides for separate and modular authentication, authorization, and accounting facilities. TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each service—authentication, authorization, and accounting—independently. Each service can be tied into its own database to take advantage of other services available on that server or on the network, depending on the capabilities of the daemon.

The goal of TACACS+ is to provide a methodology for managing multiple network access points from a single management service. The Cisco family of access servers and routers and the Cisco IOS user interface (for both routers and access servers) can be network access servers.

daz

daz

Terminal Access Controller Access-Control System (TACACS, usually pronounced like tack-axe) refers to a family of related protocols handling remote authentication and related services for networked access control through a centralized server. The original TACACS protocol, which dates back to 1984, was used for communicating with an authentication server, common in older UNIX network