hit counter script

Cisco 7604 Configuration Manual page 720

Catalyst 6500 series switch and cisco 7600 series router firewall services module configuration guide using the cli
Hide thumbs Also See for 7604:
Table of Contents

Advertisement

Glossary
Secure Hash Algorithm 1. SHA-1 [NIS94c] is a revision to SHA that was published in 1994. SHA is
SHA-1
closely modeled after MD4 and produces a 160-bit digest. Because SHA produces a 160-bit digest, it
is more resistant to brute-force attacks than 128-bit hashes (such as MD5), but it is slower. Secure
Hash Algorithm 1 is a joint creation of the National Institute of Standards and Technology and the
National Security Agency. This algorithm, like other hash algorithms, is used to generate a hash value,
also known as a message digest, that acts like a
message contents are not changed during transmission. SHA-1 is generally considered more secure
than MD5.
Session Initiation Protocol. Enables call handling sessions, particularly two-party audio conferences,
SIP
or "calls." SIP works with
SIP, the FWSM can support any SIP
A site-to-site
site-to-site VPN
VPN. In this type of VPN, neither
IPSec
IPSec
pair of
A key exchange protocol that defines how to derive authenticated keying material, with rapid key
SKEME
refreshment.
Stub Multicast Routing. SMR allows the FWSM to function as a "stub router." A stub router is a device
SMR
that acts as an
group on a particular
to hosts that are registered to receive specific multimedia or other broadcasts. A stub router forwards
IGMP
Simple Mail Transfer Protocol. SMTP is an Internet protocol that supports email services.
SMTP
Simple Network Management Protocol. A standard method for managing network devices using data
SNMP
structures called Management Information Bases.
Allows a remote
split tunneling
access to the Internet. If you do not enable split tunneling, all traffic between the
FWSM is sent through an
outside interface through a tunnel, and client access to the
A type of attack designed to foil network security mechanisms such as filters and access lists. A
spoofing
spoofing attack sends a packet that claims to be from an address from which it was not actually sent.
Structured Query Language Protocol. An Oracle protocol used to communicate between client and
SQL*Net
server processes.
Secure Shell. An application running on top of a reliable transport layer, such as TCP/IP, that provides
SSH
strong authentication and encryption capabilities.
Secure Sockets Layer. A protocol that resides between the application layer and TCP/IP to provide
SSL
transparent encryption of data traffic.
See
standby unit
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
GL-18
SDP
VPN
is established between two
peer provides encryption and authentication services for hosts on the LANs connected to each
peer. The hosts on each
LAN
IPSec
peers.
IGMP
proxy agent.
LAN
with a multicast router. Multicast routers route multicast data transmissions
messages between hosts and
VPN
client simultaneous encrypted access to a private network and clear unencrypted
IPSec
secondary
unit.
CRC
used in lower-layer protocols to ensure that
for call signaling.
SDP
specifies the ports for the media stream. Using
VoIP
gateways and
VoIP
IPSec
peers that connect remote networks into a single
IPSec
peer is the destination or source of user traffic. Instead, each
send and receive data through the secure tunnel established by the
IGMP
is used to dynamically register specific hosts in a multicast
MC
routers.
tunnel. All traffic originating from the
proxy servers.
VPN
VPN
client is sent to the
Internet
from its remote site is denied.
client and the
OL-20748-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

7609-s76137606-sCatalyst 6500 series7600 series

Table of Contents