
Glossary
GL-10
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
IPSec
IP Security. A framework of open standards that provides data confidentiality, data integrity, and data
authentication between participating peers. IPSec provides these security services at the IP layer.
IPSec uses
IKE
to handle the negotiation of protocols and algorithms based on local policy and to
generate the encryption and authentication keys to be used by IPSec. IPSec can protect one or more
data flows between a pair of hosts, between a pair of security gateways, or between a security gateway
and a host.
IPSec Phase 1
The first phase of negotiating
IPSec
, includes the key exchange and the
ISAKMP
portions of
IPSec
.
IPSec Phase 2
The second phase of negotiating
IPSec
. Phase two determines the type of encryption rules used for
payload, the source and destination that will be used for encryption, the definition of interesting traffic
according to access lists, and the
IPSec
peer.
IPSec
is applied to the interface in Phase 2.
IPSec transform set
A transform set specifies the
IPSec
protocol, encryption algorithm, and hash algorithm to use on traffic
matching the
IPSec
policy. A transform describes a security protocol (
AH
or
ESP
) with its
corresponding algorithms. The
IPSec
protocol used in almost all transform sets is
ESP
with the
DES
algorithm and HMAC-SHA for authentication.
ISAKMP
Internet Security Association and Key Management Protocol. A protocol framework that defines
payload formats, the mechanics of implementing a key exchange protocol, and the negotiation of a
security association. See
IKE
.
ISP
Internet service provider. An organization that provides connection to the
Internet
via their services,
such as modem dial in over telephone voice lines or
DSL
.
J
JTAPI
Java Telephony Application Programming Interface. A Java-based API supporting telephony
functions. See also
TAPI
.
K
key
A data object used for
encryption
,
decryption
, or
authentication
.
Kerberos
A strong network authentication protocol for client-server applications that uses secret-key
cryptography. Kerberos is one of the SASL mechanisms available for security appliance
authentication to an LDAP server.
L
LAN
Local area network. A network residing in one location, such as a single building or campus. See also
Internet
,
intranet
, and
network
.
layer, layers
Networking models implement layers with which different protocols are associated. The most
common networking model is the OSI model, which consists of the following 7 layers, in order:
physical, data link, network, transport, session, presentation, and application.
LCN
Logical channel number.
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......