Cisco PIX 525 Especificaciones Pagina 585

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 584
Glossary
GL-17
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
S
SA
security association. An instance of security policy and keying material applied to a data flow. SAs
are established in pairs by IPSec peers during both phases of IPSec. SAs specify the encryption
algorithms and other security parameters used to create a secure tunnel. Phase 1 SAs (IKE SAs)
establish a secure tunnel for negotiating Phase 2 SAs. Phase 2 SAs (IPSec SAs) establish the secure
tunnel used for sending user data. Both IKE and IPSec use SAs, although SAs are independent of one
another. IPSec SAs are unidirectional and they are unique in each security protocol. A set of SAs are
needed for a protected data pipe, one per direction per protocol. For example, if you have a pipe that
supports ESP between peers, one ESP SA is required for each direction. SAs are uniquely identified
by destination (IPSec endpoint) address, security protocol (AH or ESP), and Security Parameter Index.
IKE negotiates and establishes SAs on behalf of IPSec. A user can also establish IPSec SAs manually.
An IKE SA is used by IKE only, and unlike the IPSec SA, it is bidirectional.
SCCP
Skinny Client Control Protocol. A Cisco-proprietary protocol used between Cisco Call Manager and
Cisco Vo IP phones.
SCEP
Simple Certificate Enrollment Protocol. A method of requesting and receiving (also known as
enrolling) certificates from CAs.
SDP
Session Definition Protocol. An IETF protocol for the definition of Multimedia Services. SDP
messages can be part of SGCP and MGCP messages.
secondary unit
The backup security appliance when two are operating in failover mode.
secret key
A secret key is a key shared only between the sender and receiver. See key, public key.
security context
You can partition a single security appliance into multiple virtual firewalls, known as security
contexts. Each context is an independent firewall, with its own security policy, interfaces, and
administrators. Multiple contexts are similar to having multiple stand-alone firewalls.
security services
See cryptography.
serial transmission
A method of data transmission in which the bits of a data character are transmitted sequentially over
a single channel.
SGCP
Simple Gateway Control Protocol. Controls Vo IP gateways by an external call control element (called
a call-agent).
SGSN
Serving GPRS Support Node. The SGSN ensures mobility management, session management and
packet relaying functions.
SHA-1
Secure Hash Algorithm 1. SHA-1 [NIS94c] is a revision to SHA that was published in 1994. SHA is
closely modeled after MD4 and produces a 160-bit digest. Because SHA produces a 160-bit digest, it
is more resistant to brute-force attacks than 128-bit hashes (such as MD5), but it is slower. Secure
Hash Algorithm 1 is a joint creation of the National Institute of Standards and Technology and the
National Security Agency. This algorithm, like other hash algorithms, is used to generate a hash value,
also known as a message digest, that acts like a CRC used in lower-layer protocols to ensure that
message contents are not changed during transmission. SHA-1 is generally considered more secure
than MD5.
Vista de pagina 584
1 2 ... 580 581 582 583 584 585 586 587 588 589 590 ... 603 604

Comentarios a estos manuales

Sin comentarios