Cisco ROUTER-SDM-CD User Manual page 985

User guide
Table of Contents

Advertisement

T
T1
TACACS+
tail-end
TCP
TCP Syn Flood
Attack
Telnet
TFTP
traffic flow
confidentiality or
traffic analysis
transform
transform set
tunnel
OL-4015-12
A T1 link is a data link capable of transmitting data at a rate of 1.5 MB per
second.
Terminal Access Controller Access Control System plus. An access server
authentication and accounting protocol that uses TCP as the transport protocol.
The downstream, receive end of a tunnel.
Transmission Control Protocol. Connection-oriented transport layer protocol
that provides reliable full-duplex data transmission
A SYN-flooding attack occurs when a hacker floods a server with a barrage of
requests for connection. Because these messages have unreachable return
addresses, the connections cannot be established. The resulting volume of
unresolved open connections eventually overwhelms the server and can cause it
to deny service to valid requests, thereby preventing legitimate users from
connecting to a website, accessing e-mail, using FTP service, and so on.
A terminal emulation protocol for TCP/IP networks such as the Internet. Telnet
is a common way to control web servers remotely
Trivial File Transfer Protocol. TFTP is a simple protocol used to transfer files.
It runs on UDP and is explained in depth in Request For Comments (RFC) 1350.
Security concept that prevents the unauthorized disclosure of communication
parameters. The successful implementation of this concept hides source and
destination IP addresses, message length, and frequency of communication from
unauthorized parties
Description of a security protocol and its corresponding algorithms.
A transform set is an acceptable combination of security protocols, algorithms
and other settings to apply to IPSec protected traffic. During the IPSec security
association negotiation, the peers agree to use a particular transform set when
protecting a particular data flow.
A virtual channel through a shared medium such as the Internet, used for the
exchange of encapsulated data packets.
Cisco Router and Security Device Manager 2.5 User's Guide
Glossary
.
.
GL-37

Advertisement

Table of Contents
loading

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents