Cisco ASA 5505 Configuration Manual page 1776

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Glossary
Interprets and modifies applications so that they render correctly over a clientless SSL VPN
Content
connection.
Rewriting/Transfor
mation
A cookie is a object stored by a browser. Cookies contain information, such as user preferences, to
cookie
persistent storage.
Central Processing Unit. Main processor.
CPU
Cyclical Redundancy Check. Error-checking technique in which the frame recipient calculates a
CRC
remainder by dividing frame contents by a prime binary divisor and compares the calculated remainder
to a value stored in the frame by the sending node.
Certificate Revocation List. A digitally signed message that lists all of the current but revoked
CRL
certificates listed by a given CA. A CRL is analogous to a book of stolen charge card numbers that
allow stores to reject bad credit cards. When certificates are revoked, they are added to a CRL. When
you implement authentication using certificates, you can choose to use CRLs or not. Using CRLs lets
you easily revoke certificates before they expire, but the CRL is generally only maintained by the
or an RA. If you are using CRLs and the connection to the
authentication is requested, the authentication request will fail. See also CA, certificate,
Call Reference Value. Used by
CRV
Encryption, authentication, integrity, keys and other services used for secure communication over
cryptography
networks. See also
A data structure with a unique name and sequence number that is used for configuring VPNs on the
crypto map
adaptive security appliance. A crypto map selects data flows that need security processing and defines
the policy for these flows and the crypto peer that traffic needs to go to. A crypto map is applied to an
interface. Crypto maps contain the ACLs, encryption standards, peers, and other parameters necessary
to specify security policies for VPNs using
Computer Telephony Interface Quick Buffer Encoding. A protocol used in IP telephony between the
CTIQBE
Cisco CallManager and CTI
protocol inspection module and supports NAT, PAT, and bidirectional NAT. This protocol enables
Cisco IP SoftPhone and other Cisco TAPI/JTAPI applications to communicate with Cisco CallManager
for call setup and voice traffic across the adaptive security appliance.
Enables the adaptive security appliance to provide faster traffic flow after user authentication. The
cut-through proxy
cut-through proxy challenges a user initially at the application layer. After the security appliance
authenticates the user, it shifts the session flow and all traffic flows directly and quickly between the
source and destination while maintaining session state information.
D
Describes any method that manipulates data so that no attacker can read it. This is commonly achieved
data confidentiality
by data encryption and keys that are only available to the parties involved in the communication.
Describes mechanisms that, through the use of encryption based on
data integrity
algorithms, allow the recipient of a piece of protected data to verify that the data has not been modified
in transit.
Cisco ASA 5500 Series Configuration Guide using ASDM
GL-4
H.225.0
to distinguish call legs signaled between two entities.
VPN
and IPsec.
IKE
TAPI
and
JTAPI
CA
or
RA
is not available when
and IPsec. See also VPN.
applications. CTIQBE is used by the TAPI/JTAPI
secret key
CA
public
key, RA.
or
public key
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents