
Glossary
GL-8
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
HTTP
Hypertext Transfer Protocol. A protocol used by browsers and web servers to transfer files. When a
user views a web page, the browser can use HTTP to request and receive the files used by the web
page. HTTP transmissions are not encrypted.
HTTPS
HTTP over SSL. An
SSL
-encrypted version of HTTP.
I
IANA
Internet Assigned Number Authority. Assigns all port and protocol numbers for use on the
Internet
.
ICMP
Internet Control Message Protocol. Network-layer Internet protocol that reports errors and provides
other information relevant to IP packet processing.
IETF
The Internet Engineering Task Force. A technical standards organization that develops
RFC
documents defining protocols for the
Internet
.
IGMP
Internet Group Management Protocol. IGMP is a protocol used by IPv4 systems to report IP
multicast
memberships to neighboring multicast routers.
IKE
Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services
(such as
IPSec
) that require keys. Before any
IPSec
traffic can be passed, each FWSM must verify the
identity of its peer. This can be done by manually entering preshared keys into both hosts or by a
CA
service. IKE is a hybrid protocol that uses part
Oakley
and part of another protocol suite called
SKEME
inside
ISAKMP
framework. This is the protocol formerly known as ISAKMP/Oakley, and is
defined in RFC 2409.
IKE Extended
Authentication
IKE Extended Authenticate (Xauth) is implemented per the IETF draft-ietf-ipsec-isakmp-xauth-04.txt
(“extended authentication” draft). This protocol provides the capability of authenticating a user within
IKE using
or
RADIUS
.
IKE Mode
Configuration
IKE Mode Configuration is implemented per the IETF draft-ietf-ipsec-isakmp-mode-cfg-04.txt. IKE
Mode Configuration provides a method for a security gateway to download an IP address (and other
network level configuration) to the VPN client as part of an IKE negotiation.
ILS
Internet Locator Service. ILS is based on LDAP and is ILSv2 compliant. ILS was developed by
Microsoft for use with its NetMeeting, SiteServer, and Active Directory products.
IMAP
Internet Message Access Protocol. Method of accessing e-mail or bulletin board messages kept on a
mail server that can be shared. IMAP permits client e-mail applications to access remote message
stores as if they were local without actually transferring the message.
implicit rule
An access rule automatically created by the FWSM based on default rules or as a result of user-defined
rules.
IMSI
International Mobile Subscriber Identity. One of two components of a
GTP
tunnel ID, the other being
the
NSAPI
. See also
NSAPI
.
inside
The first interface, usually port 1, that connects your internal, “trusted” network protected by the
FWSM. See also
interface
,
interface names
.
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......