
Glossary
GL-18
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
SHA-1
Secure Hash Algorithm 1. SHA-1 [NIS94c] is a revision to SHA that was published in 1994. SHA is
closely modeled after MD4 and produces a 160-bit digest. Because SHA produces a 160-bit digest, it
is more resistant to brute-force attacks than 128-bit hashes (such as
MD5
), but it is slower. Secure
Hash Algorithm 1 is a joint creation of the National Institute of Standards and Technology and the
National Security Agency. This algorithm, like other hash algorithms, is used to generate a hash value,
also known as a message digest, that acts like a
CRC
used in lower-layer protocols to ensure that
message contents are not changed during transmission. SHA-1 is generally considered more secure
than
MD5
.
SIP
Session Initiation Protocol. Enables call handling sessions, particularly two-party audio conferences,
or “calls.” SIP works with
SDP
for call signaling.
SDP
specifies the ports for the media stream. Using
SIP, the FWSM can support any SIP
VoIP
gateways and
VoIP
proxy servers.
site-to-site VPN
A site-to-site
VPN
is established between two
IPSec
peers that connect remote networks into a single
VPN
. In this type of
VPN
, neither
IPSec
peer is the destination or source of user traffic. Instead, each
IPSec
peer provides encryption and authentication services for hosts on the
LAN
s connected to each
IPSec
peer. The hosts on each
LAN
send and receive data through the secure tunnel established by the
pair of
IPSec
peers.
SKEME
A key exchange protocol that defines how to derive authenticated keying material, with rapid key
refreshment.
SMR
Stub Multicast Routing. SMR allows the FWSM to function as a “stub router.” A stub router is a device
that acts as an
IGMP
proxy agent.
IGMP
is used to dynamically register specific hosts in a multicast
group on a particular
LAN
with a multicast router. Multicast routers route multicast data transmissions
to hosts that are registered to receive specific multimedia or other broadcasts. A stub router forwards
IGMP
messages between hosts and
MC router
s.
SMTP
Simple Mail Transfer Protocol. SMTP is an Internet protocol that supports email services.
SNMP
Simple Network Management Protocol. A standard method for managing network devices using data
structures called Management Information Bases.
split tunneling
Allows a remote
VPN
client simultaneous encrypted access to a private network and clear unencrypted
access to the
Internet
. If you do not enable split tunneling, all traffic between the
VPN
client and the
FWSM is sent through an
IPSec
tunnel. All traffic originating from the
VPN
client is sent to the
outside interface through a tunnel, and client access to the
Internet
from its remote site is denied.
spoofing
A type of attack designed to foil network security mechanisms such as filters and access lists. A
spoofing attack sends a packet that claims to be from an address from which it was not actually sent.
SQL*Net
Structured Query Language Protocol. An Oracle protocol used to communicate between client and
server processes.
SSH
Secure Shell. An application running on top of a reliable transport layer, such as TCP/IP, that provides
strong authentication and encryption capabilities.
SSL
Secure Sockets Layer. A protocol that resides between the application layer and TCP/IP to provide
transparent encryption of data traffic.
standby unit
See
secondary unit
.
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......