Glossary
GL-4
Cisco ASA Series CLI Configuration Guide
Content
Rewriting/Transform
ation
Interprets and modifies applications so that they render correctly over a clientless SSL VPN
connection.
cookie
A cookie is a object stored by a browser. Cookies contain information, such as user preferences, to
persistent storage.
CPU
Central Processing Unit. Main processor.
CRC
Cyclical Redundancy Check. Error-checking technique in which the frame recipient calculates a
remainder by dividing frame contents by a prime binary divisor and compares the calculated remainder
to a value stored in the frame by the sending node.
CRL
Certificate Revocation List. A digitally signed message that lists all of the current but revoked
certificates listed by a given
. A CRL is analogous to a book of stolen charge card numbers that
allow stores to reject bad credit cards. When certificates are revoked, they are added to a CRL. When
you implement authentication using certificates, you can choose to use CRLs or not. Using CRLs lets
you easily revoke certificates before they expire, but the CRL is generally only maintained by the
or an
. If you are using CRLs and the connection to the
is not available when
authentication is requested, the authentication request will fail. See also
CRV
Call Reference Value. Used by
to distinguish call legs signaled between two entities.
cryptography
Encryption, authentication, integrity, keys and other services used for secure communication over
networks. See also
crypto map
A data structure with a unique name and sequence number that is used for configuring VPNs on the
ASA. A crypto map selects data flows that need security processing and defines the policy for these
flows and the crypto peer that traffic needs to go to. A crypto map is applied to an interface. Crypto
maps contain the
s, encryption standards, peers, and other parameters necessary to specify security
policies for
and
CTIQBE
Computer Telephony Interface Quick Buffer Encoding. A protocol used in IP telephony between the
Cisco CallManager and CTI
applications. CTIQBE is used by the TAPI/JTAPI
protocol inspection module and supports
, and bidirectional
. This protocol enables
Cisco IP SoftPhone and other Cisco TAPI/JTAPI applications to communicate with Cisco CallManager
for call setup and voice traffic across the ASA.
cut-through proxy
Enables the ASA to provide faster traffic flow after user authentication. The cut-through proxy
challenges a user initially at the application layer. After the security appliance authenticates the user,
it shifts the session flow and all traffic flows directly and quickly between the source and destination
while maintaining session state information.
D
data confidentiality
Describes any method that manipulates data so that no attacker can read it. This is commonly achieved
by data encryption and
s that are only available to the parties involved in the communication.
data integrity
Describes mechanisms that, through the use of encryption based on
algorithms, allow the recipient of a piece of protected data to verify that the data has not been modified
in transit.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......