How Cut-Through Proxy Works

How Cut-Through Proxy Works
NOTE Users can authenticate to a user database on Cisco Security Appliance, but it is
more efficient to use an external authentication server with RADIUS or TACACS+ because
the processing required by the PIX Firewall to maintain and query an internal database
increases the firewall’s workload.