Cisco ASA 5505 Configuration Manual page 1790

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Glossary
Simple Certificate Enrollment Protocol. A method of requesting and receiving (also known as
SCEP
enrolling) certificates from CAs.
Session Definition Protocol. An
SDP
messages can be part of
The backup adaptive security appliance when two are operating in failover mode.
secondary unit
A secret key is a key shared only between the sender and receiver. See key,
secret key
You can partition a single adaptive security appliance into multiple virtual firewalls, known as security
security context
contexts. Each context is an independent firewall, with its own security policy, interfaces, and
administrators. Multiple contexts are similar to having multiple stand-alone firewalls.
See cryptography.
security services
A method of data transmission in which the bits of a data character are transmitted sequentially over
serial transmission
a single channel.
Simple Gateway Control Protocol. Controls
SGCP
a call-agent).
Serving GPRS Support Node. The SGSN ensures mobility management, session management, and
SGSN
packet relaying functions.
Secure Hash Algorithm 1. SHA-1 [NIS94c] is a revision to SHA that was published in 1994. SHA is
SHA-1
closely modeled after MD4 and produces a 160-bit digest. Because SHA produces a 160-bit digest, it
is more resistant to brute-force attacks than 128-bit hashes (such as MD5), but it is slower. Secure
Hash Algorithm 1 is a joint creation of the National Institute of Standards and Technology and the
National Security Agency. This algorithm, like other hash algorithms, is used to generate a hash value,
also known as a message digest, that acts like a
message contents are not changed during transmission. SHA-1 is generally considered more secure
than MD5.
Session Initiation Protocol. Enables call handling sessions, particularly two-party audio conferences,
SIP
or calls. SIP works with
SIP, the adaptive security appliance can support any SIP
A site-to-site
site-to-site VPN
VPN. In this type of VPN, neither
IPsec
IPsec
pair of
A key exchange protocol that defines how to derive authenticated keying material, with rapid key
SKEME
refreshment.
Stub Multicast Routing. SMR allows the adaptive security appliance to function as a stub router. A
SMR
stub router is a device that acts as an
hosts in a multicast group on a particular
multicast data transmissions to hosts that are registered to receive specific multimedia or other
broadcasts. A stub router forwards
Simple Mail Transfer Protocol. SMTP is an Internet protocol that supports email services.
SMTP
Cisco ASA 5500 Series Configuration Guide using ASDM
GL-18
SGCP
and
SDP
for call signaling.
VPN
is established between two
peer provides encryption and authentication services for hosts on the LANs connected to each
peer. The hosts on each
LAN
IPsec
peers.
IETF
protocol for the definition of Multimedia Services. SDP
MGCP
messages.
VoIP
gateways by an external call control element (called
CRC
used in lower-layer protocols to ensure that
SDP
specifies the ports for the media stream. Using
VoIP
IPsec
peers that connect remote networks into a single
IPsec
peer is the destination nor source of user traffic. Instead, each
send and receive data through the secure tunnel established by the
IGMP
proxy agent.
IGMP
LAN
with a multicast router. Multicast routers route
IGMP
messages between hosts and
public
key.
gateways and
VoIP
proxy servers.
is used to dynamically register specific
MC
routers.
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents