Cisco Cat4K NDPP ST
11 March 2014
EDCS-1228241
7
Acronyms /
Abbreviations
Definition
CC
Common Criteria for Information Technology Security Evaluation
CEM
Common Evaluation Methodology for Information Technology Security
CLI
Command Line Interface
CM
Configuration Management
DH
Diffie-Hellman
EAL
Evaluation Assurance Level
EEPROM
Electrically erasable programmable read-only memory, specifically the memory
in the switch where the Cisco IOS is stored.
EIGRP
Enhanced Interior Gateway Routing Protocol
FIPS
Federal Information Processing Standard
HMAC
Hashed Message Authentication Code
HTTPS
Hyper-Text Transport Protocol Secure
IEEE
Institute of Electrical and Electronics Engineers
IGMP
Internet Group Management Protocol
IOS
The proprietary operating system developed by Cisco Systems.
IP
Internet Protocol
IPSEC
IP Security
IT
Information Technology
MAC
Media Access Control
NTP
Network Time Protocol
NVRAM
Non-volatile random access memory, specifically the memory in the switch
where the configuration parameters are stored.
OS
Operating System
OSPF
Open Shortest Path First. An interior gateway protocol (routes within a single
autonomous system). A link-state routing protocol which calculates the shortest
path to each node.
Packet
A block of data sent over the network transmitting the identities of the sending
and receiving stations, error-control information, and message.
PP
Protection Profile
PRNG
Pseudo Random Number Generator
PVLAN
Private VLAN
RADIUS
Remote Authentication Dial In User Service
RIP
Routing Information Protocol. An interior gateway protocol (routes within a
single autonomous system). A distance-vector protocol that uses hop count as it’s
metric.
RNG
Random Number Generator
RSA
Rivest, Shamir and Adleman (algorithm for public-key cryptography)
SM
Service Module
SSH
Secure Shell
SSHv2
Secure Shell (version 2)
ST
Security Target
TACACS
Terminal Access Controller Access Control System
TCP
Transport Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol
TDES
Triple Data Encryption Standard
TLS
Transport Layer Security
TOE
Target of Evaluation
TSC
TSF Scope of Control
TSF
TOE Security Function
TSP
TOE Security Policy