Submitted by: Submitted by swire84
Views: 127
Words: 1366
Pages: 6
Category: Science and Technology
Date Submitted: 02/13/2014 03:38 PM
Objectives
• Explain the function and operation of the authentication, authorization, and accounting (AAA)
Protocol.
Authentication refers to the process where an entity's identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the corresponding credentials. The authorization function determines whether a particular entity is authorized to perform a given activity, typically inherited from authentication when logging on to an application or service. Authorization may be determined based on a range of restrictions, for example time-of-day restrictions, or physical location restrictions, or restrictions against multiple accesses by the same entity or user. Accounting refers to the tracking of network resource consumption by users for the purpose of capacity and trend analysis, cost allocation, billing. In addition, it may record events such as authentication and authorization failures, and include auditing functionality, which permits verifying the correctness of procedures carried out based on accounting data. Real-time accounting refers to accounting information that is delivered concurrently with the consumption of the resources. Authentication, authorization, and accounting (AAA) has changed dramatically as users of new-world access technologies seek a way to authenticate, authorize, and start accounting records for billing user time on their networks.
Cisco Systems has a rich and robust AAA implementation that enables a wide range of application clients including:
•802.11b
•Cable and DSL
• Describe the importance of AAA as it relates to authentication, authorization, and accounting
Security for user access to the network and the ability to dynamically define a user's profile to gain access to network resources has a legacy dating back to asynchronous dial access. AAA network security services provide the primary framework through which a network administrator can set up access...