Cisco PIX 525 Dokumentacja Strona 583

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 582
Glossary
GL-15
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
protocol, protocol
literals
A standard that defines the exchange of packets between network nodes for communication. Protocols
work together in layers. Protocols are specified in a security appliance configuration as part of
defining a security policy by their literal values or port numbers. Possible security appliance protocol
literal values are ahp, eigrp, esp, gre, icmp, igmp, igrp, ip, ipinip, ipsec, nos, ospf, pcp, snp, tcp, and
udp.
Proxy-ARP
Enables the security appliance to reply to an ARP request for IP addresses in the global pool. See also
ARP.
public key
A public key is one of a pair of keys that are generated by devices involved in public key infrastructure.
Data encrypted with a public key can only be decrypted using the associated private key. When a
private key is used to produce a digital signature, the receiver can use the public key of the sender to
verify that the message was signed by the sender. These characteristics of key pairs provide a scalable
and secure method of authentication over an insecure media, such as the Internet.
Q
QoS
quality of service. Measure of performance for a transmission system that reflects its transmission
quality and service availability.
R
RA
Registration Authority. An authorized proxy for a CA. RAs can perform certificate enrollment and can
issue CRLs. See also CA, certificate, public key.
RADIUS
Remote Authentication Dial-In User Service. RADIUS is a distributed client/server system that
secures networks against unauthorized access. RFC 2058 and RFC 2059 define the RADIUS protocol
standard. See also AAA and TACACS+.
Refresh
Retrieve the running configuration from the security appliance and update the screen. The icon and
the button perform the same function.
registration
authority
See RA.
replay-detection
A security service where the receiver can reject old or duplicate packets to defeat replay attacks.
Replay attacks rely on the attacker sending out older or duplicate packets to the receiver and the
receiver thinking that the bogus traffic is legitimate. Replay-detection is done by using sequence
numbers combined with authentication, and is a standard feature of IPSec.
RFC
Request for Comments. RFC documents define protocols and standards for communications over the
Internet. RFCs are developed and published by IETF.
RIP
Routing Information Protocol. Interior gateway protocol (IGP) supplied with UNIX BSD systems.
The most common IGP in the Internet. RIP uses hop count as a routing metric.
Przeglądanie stron 582
1 2 ... 578 579 580 581 582 583 584 585 586 587 588 ... 603 604

Komentarze do niniejszej Instrukcji

Brak uwag