In this lab I will be configuring the Cisco ASA to authenticate, authorize and account users accessing the firewall. This will be done using the CLI of the ASA.Requirements of the lab:-Authenticate SSH, HTTPS and console access to the AAA server using TACACS+.-Only allow SSH and HTTPS access from the "inside" interface for devices from subnet 192.168.3.0/24.-Fall-back to a special local account if the AAA server fails-Level 1 user has no privileged access.-Level 2 user has privileged access but can only run the following commands:-Show running-config-Show route-Level 3 user has full privileged access.-Account all exec access and configuration changes to the AAA server.-ASA will already have been preconfigured as a firewall.-Putty will be used to connect via SSH-Google chrome will be used to connect via HTTPS.Hint: Do not save the configuration of the ASA until you are satisfied that this feature is fully working. This is because password recovery can be time consuming and will require you to reload your ASA with about one hour of down time.This lab guide has been designed so that you can build your own lab and test out the features. You will need: