129, 204–205, 210
Business-to-business interactions, 7
Authentication methods, 207
Buy.com, 10
Authentication proxy, 280–286
benefits, 282
C
comparison. See Lock-and-key
configuration, 283–285
C-CRT. See Cisco Countermeasure
Research Team
example, 285–286
CAR. See Committed Access Rate
process, explanation, 280–281
CAs. See Certificate Authorities
restrictions, 282–283
CBAC. See Context-based access con-
service, 335
trol
Authentication server (AS), 247–249
CBC. See Cipher Block Chaining
Authenticator, 248
CCO logon, 329
CDP. See Cisco Discovery Protocol
Cisco AAA mechanisms, 233, 239–279,
421–424
CEF. See Cisco Express Forwarding
FAQs, 287
CEP. See Certificate Enrollment
Protocol
Cisco Countermeasure Research Team
(C-CRT), 317, 425
CERT, 7
Cisco Discovery Protocol (CDP), 432
document, 298
Cisco Encryption Technology (CET),
report, 8
Bạn đang xem 129, - Syngress Managing Cisco Network Security