Cisco PIX 525 Especificaciones Pagina 570

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 569
Glossary
GL-2
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
ARP
Address Resolution Protocol. A low-level TCP/IP protocol that maps a hardware address, or MAC
address, to an IP address. An example hardware address is 00:00:a6:00:01:ba. The first three groups
of characters (00:00:a6) identify the manufacturer; the rest of the characters (00:01:ba) identify the
system card. ARP is defined in RFC 826.
ASA
Adaptive Security Algorithm. Used by the security appliance to perform inspections. ASA allows
one-way (inside to outside) connections without an explicit configuration for each internal system and
application. See also inspection engine.
ASDM
Adaptive Security Device Manager. An application for managing and configuring a single security
appliance.
asymmetric
encryption
Also called public key systems, asymmetric encryption allows anyone to obtain access to the public
key of anyone else. Once the public key is accessed, one can send an encrypted message to that person
using the public key. See also encryption, public key.
authentication
Cryptographic protocols and services that verify the identity of users and the integrity of data. One of
the functions of the IPSec framework. Authentication establishes the integrity of datastream and
ensures that it is not tampered with in transit. It also provides confirmation about the origin of the
datastream. See also AAA, encryption, and VPN.
B
BGP
Border Gateway Protocol. BGP performs interdomain routing in TCP/IP networks. BGP is an Exterior
Gateway Protocol, which means that it performs routing between multiple autonomous systems or
domains and exchanges routing and access information with other BGP systems. The security
appliance does not support BGP. See also EGP.
BLT stream
Bandwidth Limited Traffic stream. Stream or flow of packets whose bandwidth is constrained.
BOOTP
Bootstrap Protocol. Lets diskless workstations boot over the network as is described in RFC 951 and
RFC 1542.
BPDU
Bridge Protocol Data Unit. Spanning-Tree Protocol hello packet that is sent out at configurable
intervals to exchange information among bridges in the network. Protocol data unit is the OSI term
for packet.
C
CA
Certificate Authority, Certification Authority. A third-party entity that is responsible for issuing and
revoking certificates. Each device with the public key of the CA can authenticate a device that has a
certificate issued by the CA. The term CA also refers to software that provides CA services. See also
certificate, CRL, public key, RA.
cache
A temporary repository of information accumulated from previous task executions that can be reused,
decreasing the time required to perform the tasks.
CBC
Cipher Block Chaining. A cryptographic technique that increases the encryption strength of an
algorithm. CBC requires an initialization vector (IV) to start encryption. The IV is explicitly given in
the IPSec packet.
Vista de pagina 569
1 2 ... 565 566 567 568 569 570 571 572 573 574 575 ... 603 604

Comentarios a estos manuales

Sin comentarios