204–205, 210BUSINESS-TO-BUSINESS INTERACTIONS, 7AUTHENTICATION ME...

129, 204–205, 210

Business-to-business interactions, 7

Authentication methods, 207

Buy.com, 10

Authentication proxy, 280–286

benefits, 282

C

comparison. See Lock-and-key

configuration, 283–285

C-CRT. See Cisco Countermeasure

Research Team

example, 285–286

CAR. See Committed Access Rate

process, explanation, 280–281

CAs. See Certificate Authorities

restrictions, 282–283

CBAC. See Context-based access con-

service, 335

trol

Authentication server (AS), 247–249

CBC. See Cipher Block Chaining

Authenticator, 248

CCO logon, 329

CDP. See Cisco Discovery Protocol

Cisco AAA mechanisms, 233, 239–279,

421–424

CEF. See Cisco Express Forwarding

FAQs, 287

CEP. See Certificate Enrollment

Protocol

Cisco Countermeasure Research Team

(C-CRT), 317, 425

CERT, 7

Cisco Discovery Protocol (CDP), 432

document, 298

Cisco Encryption Technology (CET),

report, 8