hit counter script

Cisco ROUTER-SDM-CD User Manual page 968

User guide
Table of Contents

Advertisement

Glossary
key exchange
key lifetime
key management
key pair
key recovery
L
L2F Protocol
L2TP
LAC
LAN
LAPB
Layer 3 Interface
LBO
Cisco Router and Security Device Manager 2.5 User's Guide
GL-20
The method by which two or more parties exchange encryption keys. The IKE
protocol provides one such method.
An attribute of a key pair that specifies a time span, during which the certificate
containing the public component of that key pair is considered valid.
The creation, distribution, authentication, and storage of encryption keys.
See
public key
encryption.
A trusted method by which encrypted information can be decrypted if the
decryption key is lost or destroyed.
Layer 2 Forwarding Protocol. Protocol that supports the creation of secure
virtual private dial-up networks over the Internet.
Layer 2 Tunneling Protocol. An Internet Engineering Task Force (IETF)
standards track protocol defined in RFC 2661 that provides tunneling of PPP.
Based upon the best features of L2F and PPTP, L2TP provides an industry-wide
interoperable method of implementing VPDN. L2TP is proposed as an IPSec
alternative, but is used sometimes alongside IPSec to provide authentication
services.
L2TP access concentrator. Device terminating calls to remote systems and
tunneling PPP sessions between remote systems and the LNS.
Local Area Network. A network residing in one location or belonging to one
organization, typically, but not necessarily using IP and other Internet protocols.
Not the global Internet. See also intranet, network, Internet.
Link Access Procedure, Balanced.
Layer 3 interfaces support internetwork routing. A VLAN is an example of a
logical layer 3 interface. An Ethernet port is an example of a physical layer 3
interface.
Line Build Out.
OL-4015-12

Advertisement

Table of Contents
loading

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents