Cisco OL-4015-08 User Manual page 674

Cisco router and security device manager user's guide
Table of Contents

Advertisement

Glossary
traffic flow
confidentiality or
traffic analysis
transform
transform set
tunnel
tunneling
U
UDP
unencrypted
Unity Client
URL
V
verification
VCI
Cisco Router and Security Device Manager Version 2.2 User's Guide
GL-32
Security concept that prevents the unauthorized disclosure of communication
parameters. The successful implementation of this concept hides source and
destination IP addresses, message length, and frequency of communication from
unauthorized parties
Description of a security protocol and its corresponding algorithms.
A transform set is an acceptable combination of security protocols, algorithms
and other settings to apply to IPSec protected traffic. During the IPSec security
association negotiation, the peers agree to use a particular transform set when
protecting a particular data flow.
A virtual channel through a shared medium such as the Internet, used for the
exchange of encapsulated data packets.
The process of piping the stream of one protocol through another protocol.
User Datagram Protocol. Connectionless transport layer protocol in the TCP/IP
protocol that belongs to the Internet protocol family.
Not encrypted.
A client of a Unity Easy VPN Server.
Universal Resource Locator. A standardized addressing scheme for accessing
hypertext documents and other services using a browser, for example,
http://www.cisco.com.
Identity confirmation of a person or process.
virtual channel identifier. A virtual path may carry multiple virtual channels
corresponding to individual connections. The VCI identifies the channel being
used. The combination of VPI and VCI identifies an ATM connection.
OL-4015-08

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents