Soto Campos, IgnacioBernardos Cano, Carlos JesúsCalderón Pastor, María Carmen2008-04-172008-04-172007(Reprinted from)The Internet Protocol Journal (IPJ), Volume 10, Number 2, Pages 16-27, June 2007.https://hdl.handle.net/10016/2471Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA.application/pdfengAtribución-NoComercial-SinDerivadas 3.0 EspañaIPv6 Network Mobilityresearch articleTelecomunicacionesopen access