See cut-through proxy, They call it like that in the ASA world.
[ view entry ] ( 1943 views ) | print article
<<First <Back | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | Next> Last>>
Lock-and-key access allows you to set up dynamic access lists that grant access per user to a specific source/destination host through a user authentication process(telnet login authentication).
See cut-through proxy, They call it like that in the ASA world. [ view entry ] ( 1943 views ) | print article <<First <Back | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | Next> Last>> |