Cisco OL-4015-08 User Manual page 667

Cisco router and security device manager user's guide
Table of Contents

Advertisement

public key
encryption
PVC
Q
QoS
quick mode
R
RA
RADIUS
RCP
OL-4015-08
In public key encryption systems, every user has both a public key and a private
key. Each private key is maintained by a single user and shared with no one. The
private key is used to generate a unique digital signature and to decrypt
information encrypted with the public key. In contrast, a user's public key is
available to everyone to encrypt information intended for that user, or to verify
that user's digital signature. Sometimes called public key cryptography.
permanent virtual circuit (or connection). Virtual circuit that is permanently
established. PVCs save bandwidth associated with circuit establishment and tear
down in situations where certain virtual circuits must exist all the time. In ATM
terminology, called a permanent virtual connection.
Quality of Service. A method of guaranteeing bandwidth to specified types of
traffic.
In Oakley, the name of the mechanism used after a security association has been
established to negotiate changes in security services, such as new keys.
registration authority. An entity serving as an optional component in PKI
systems to record or verify some of the information that certification authorities
(CAs) use when issuing certificates or performing other certificate management
functions. The CA itself might perform all RA functions, but they are generally
kept separate. RA duties vary considerably, but may include assigning
distinguished names, distributing tokens, and performing personal
authentication functions.
Remote Authentication Dial-In User Service. An access server authentication and
accounting protocol that uses UDP as the transport protocol. See also
remote copy protocol. Protocol that allows users to copy files to and from a file
system residing on a remote host or server on the network. The rcp protocol uses
TCP to ensure the reliable delivery of data
Cisco Router and Security Device Manager Version 2.2 User's Guide
Glossary
TACACS+
GL-25

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents