Cisco OL-4015-08 User Manual page 656

Cisco router and security device manager user's guide
Table of Contents

Advertisement

Glossary
IDS Sensor
IDM
IETF
IGMP
IKE
IKE negotiation
implicit rule
inside global
inside local
inspection rule
Cisco Router and Security Device Manager Version 2.2 User's Guide
GL-14
An IDS sensor is hardware on with the Cisco IDS runs. IDS sensors can be
stand-alone devices, or network modules installed on routers.
IDS Device Manager. IDM is software used to manage an IDS sensor.
Internet Engineering Task Force.
Internet Group Management Protocol. IGMP is a protocol used by IPv4 systems
to report IP multicast memberships to neighboring multicast routers
Internet Key Exchange. IKE is a key management protocol standard used in
conjunction with IPSec and other standards. IPSec can be configured without
IKE, but IKE enhances IPSec by providing additional features, flexibility, and
ease of configuration for the IPSec standard. IKE provides authentication of the
IPSec peers, negotiates IPSec keys, and negotiates IPSec security associations.
Before any IPSec traffic can be passed, each router/firewall/host must be able to
verify the identity of its peer. This can be done by manually entering preshared
keys into both hosts or by a CA service. IKE is a hybrid protocol that implements
the Oakley key exchange and Skeme key exchange inside the Internet Security
Association and Key Management Protocol (ISAKMP) framework. (ISAKMP,
Oakley, and Skeme are security protocols implemented by IKE.)
A method for the secure exchange of private keys across non-secured networks.
An access rule automatically created by the router based on default rules or as a
result of user-defined rules.
The IP address of a host inside a network as it appears to devices outside the
network.
The configured IP address assigned to a host inside the network.
A
CBAC
inspection rule allows the router to inspect specified outgoing traffic
so that it can allow return traffic of the same type that is associated with a session
started on the LAN. If a firewall is in place, incoming traffic that is associated
with a session started inside the firewall might be dropped if an inspection rule
has not been configured.
OL-4015-08

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents