Specifications

© Copyright 2007 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
29
approved algorithms. Note that all users must still authenticate after remote access is
granted.