
Glossary
GL-21
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
user EXEC mode
User EXEC mode lets you to see the FWSM settings. The user EXEC mode prompt appears as follows
when you first access the FWSM. See also
command-specific configuration mode
,
global configuration
mode
, and
privileged EXEC mode
.
UTC
Coordinated Universal Time. The time zone at zero degrees longitude, previously called Greenwich
Mean Time (GMT) and Zulu time. UTC replaced GMT in 1967 as the world time standard. UTC is
based on an atomic time scale rather than an astronomical time scale.
UTRAN
Universal Terrestrial Radio Access Network. Networking protocol used for implementing wireless
networks in UMTS. GTP allows multi-protocol packets to be tunneled through a UMTS/GPRS
backbone between a
GGSN
, an
SGSN
and the
UTRAN
.
UUIE
User-User Information Element. An element of an
H.225
packet that identifies the users implicated in
the message.
V
VLAN
Virtual
LAN
. A group of devices on one or more
LAN
s that are configured (using management
software) so that they can communicate as if they were attached to the same physical network cable,
when in fact they are located on a number of different
LAN
segments. Because VLANs are based on
logical instead of physical connections, they are extremely flexible.
VoIP
Voice over IP. VoIP carries normal voice traffic, such as telephone calls and faxes, over an IP-based
network. DSP segments the voice signal into frames, which then are coupled in groups of two and
stored in voice packets. These voice packets are transported using IP in compliance with ITU-T
specification
H.323
.
VPN
Virtual Private Network. A network connection between two peers over the public network that is
made private by strict authentication of users and the encryption of all data traffic. You can establish
VPNs between clients, such as PCs, or a
headend
, such as the FWSM.
virtual firewall
See
security context
.
VRRP
Virtual Router Redundancy Protocol. VRRP is an election protocol that dynamically assigns
responsibility for one or more virtual router(s) to the VRRP router(s) on a LAN, allowing several
routers on a multiaccess link to utilize the same virtual IP address.
VSA
Vendor-specific attribute. An attribute in a
RADIUS
packet that is defined by a vendor rather than by
RADIUS
RFCs. The
RADIUS
protocol uses IANA-assigned vendor numbers to help identify VSAs.
This lets different vendors have VSAs of the same number. The combination of a vendor number and
a VSA number makes a VSA unique. For example, the cisco-av-pair VSA is attribute 1 in the set of
VSAs related to vendor number 9. Each vendor can define up to 256 VSAs. A
RADIUS
packet
contains any VSAs attribute 26, named Vendor-specific. VSAs are sometimes referred to as
subattributes.
W
WAN
wide-area network. Data communications network that serves users across a broad geographic area
and often uses transmission devices provided by common carriers.
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......