
Glossary
GL-15
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
PPTP TCP
Standard
TCP
session over which
PPTP
call control and management information is passed. The
control session is logically associated with, but separate from, the sessions being tunneled through a
PPTP
tunnel.
preshared key
A preshared key provides a method of
IKE
authentication that is suitable for networks with a limited,
static number of
IPSec
peers. This method is limited in scalability because the key must be configured
for each pair of
IPSec
peers. When a new
IPSec
peer is added to the network, the preshared key must
be configured for every
IPSec
peer with which it communicates. Using
certificate
s and
CA
s provides
a more scalable method of
IKE
authentication.
primary, primary
unit
The FWSM normally operating when two units, a primary and secondary, are operating in failover
mode.
privileged EXEC
mode
Privileged EXEC mode lets you to change current settings. Any user EXEC mode command will work
in privileged EXEC mode. See also
command-specific configuration mode
,
global configuration mode
,
user EXEC mode
.
protocol, protocol
literals
A standard that defines the exchange of packets between network nodes for communication. Protocols
work together in layers. Protocols are specified in a FWSM configuration as part of defining a security
policy by their literal values or port numbers. Possible FWSM protocol literal values are ahp, eigrp,
esp, gre, icmp, igmp, igrp, ip, ipinip, ipsec, nos, ospf, pcp, snp, tcp, and udp.
Proxy-ARP
Enables the FWSM to reply to an
ARP
request for IP addresses in the global pool. See also
ARP
.
public key
A public key is one of a pair of keys that are generated by devices involved in public key infrastructure.
Data encrypted with a public key can only be decrypted using the associated private key. When a
private key is used to produce a digital signature, the receiver can use the public key of the sender to
verify that the message was signed by the sender. These characteristics of key pairs provide a scalable
and secure method of authentication over an insecure media, such as the
Internet
.
Q
QoS
quality of service. Measure of performance for a transmission system that reflects its transmission
quality and service availability.
R
RA
Registration Authority. An authorized proxy for a
CA
. RAs can perform certificate enrollment and can
issue
CRL
s. See also
CA
,
certificate
,
public key
.
RADIUS
Remote Authentication Dial-In User Service. RADIUS is a distributed client/server system that
secures networks against unauthorized access. RFC 2058 and RFC 2059 define the RADIUS protocol
standard. See also
AAA
and
.
Refresh
Retrieve the running configuration from the FWSM and update the screen. The icon and the button
perform the same function.
registration
authority
See
RA
.
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......