Glossary
GL-9
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
IKE
Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services
(such as
IPSec
) that require keys. Before any
IPSec
traffic can be passed, each security appliance must
verify the identity of its peer. This can be done by manually entering preshared keys into both hosts
or by a
CA
service. IKE is a hybrid protocol that uses part
Oakley
and part of another protocol suite
called
SKEME
inside
ISAKMP
framework. This is the protocol formerly known as ISAKMP/Oakley,
and is defined in RFC 2409.
IKE Extended
Authentication
IKE Extended Authenticate (Xauth) is implemented per the IETF draft-ietf-ipsec-isakmp-xauth-04.txt
(“extended authentication” draft). This protocol provides the capability of authenticating a user within
IKE using
or
RADIUS
.
IKE Mode
Configuration
IKE Mode Configuration is implemented per the IETF draft-ietf-ipsec-isakmp-mode-cfg-04.txt. IKE
Mode Configuration provides a method for a security gateway to download an IP address (and other
network level configuration) to the VPN client as part of an IKE negotiation.
ILS
Internet Locator Service. ILS is based on LDAP and is ILSv2 compliant. ILS was developed by
Microsoft for use with its NetMeeting, SiteServer, and Active Directory products.
IMAP
Internet Message Access Protocol. Method of accessing e-mail or bulletin board messages kept on a
mail server that can be shared. IMAP permits client e-mail applications to access remote message
stores as if they were local without actually transferring the message.
implicit rule
An access rule automatically created by the security appliance based on default rules or as a result of
user-defined rules.
IMSI
International Mobile Subscriber Identity. One of two components of a
GTP
tunnel ID, the other being
the
NSAPI
. See also
NSAPI
.
inside
The first interface, usually port 1, that connects your internal, “trusted” network protected by the
security appliance. See also
interface
,
interface names
.
inspection engine
The security appliance inspects certain application-level protocols to identify the location of
embedded addressing information in traffic. This allows
NAT
to translate these embedded addresses
and to update any checksum or other fields that are affected by the translation. Because many
protocols open secondary
TCP
or
UDP
ports, each application inspection engine also monitors
sessions to determine the port numbers for secondary channels. The initial session on a well-known
port is used to negotiate dynamically assigned port numbers. The application inspection engine
monitors these sessions, identifies the dynamic port assignments, and permits data exchange on these
ports for the duration of the specific session. Some of the protocols that the security appliance can
inspect are
CTIQBE
,
FTP
,
H.323
,
HTTP
,
MGCP
,
SMTP
, and
SNMP
.
interface
The physical connection between a particular network and a security appliance.
interface ip_address
The IP address of a security appliance network interface. Each interface IP address must be unique.
Two or more interfaces must not be given the same IP address or IP addresses that are on the same IP
network.
interface names
Human readable name assigned to a security appliance network interface. The inside interface default
name is “inside” and the outside interface default name is “outside.” Any perimeter interface default
names are “intf
n
”, such as intf2 for the first perimeter interface, intf3 for the second perimeter
interface, and so on to the last interface. The numbers in the intf string corresponds to the position of
the interface card in the security appliance. You can use the default names or, if you are an experienced
user, give each interface a more meaningful name. See also
inside
,
intfn
,
outside
.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......