G L O S S A R Y - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Numerics
|
A
|
B
|
C
|
D
|
E
|
Numerics
See DES.
3DES
A
Authentication, authorization, and accounting. See also
AAA
Area Border Router. In OSPF, a router with interfaces in multiple areas.
ABR
Access Control Entry. Information entered into the configuration that lets you specify what type of
ACE
traffic to permit or deny on an interface. By default, traffic that is not explicitly permitted is denied.
The security appliance CLI uses several command modes. The commands available in each mode vary.
Access Modes
See also
configuration
Access Control List. A collection of ACEs. An ACL lets you specify what type of traffic to allow on
ACL
an interface. By default, traffic that is not explicitly permitted is denied. ACLs are usually applied to
the
A set of object-oriented programming technologies and tools used to create mobile or portable
ActiveX
programs. An ActiveX program is roughly equivalent to a Java applet.
See ARP.
Address Resolution
Protocol
The translation of a network address and/or port to another network address/or port. See also
address translation
interface
Advanced Encryption Standard. A symmetric block cipher that can encrypt and decrypt information.
AES
The AES algorithm is capable of using cryptographic keys of 128, 192 and 256 bits to encrypt and
decrypt data in blocks of 128 bits. See also DES.
Authentication Header. An IP protocol (type 51) that can ensure data integrity, authentication, and
AH
replay detection. AH is embedded in the data to be protected (a full IP datagram, for example). AH can
be used either by itself or with ESP. This is an older
networks than ESP. AH provides authentication services but does not provide encryption services. It is
provided to ensure compatibility with
authentication
"A" stands for address, and refers to name-to-address mapped records in DNS.
A record address
OL-12172-03
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
user EXEC
mode,
privileged EXEC
mode.
interface
which is the source of inbound traffic. See also rule,
PAT, NAT, PAT,
Static
and encryption. See also

G L O S S A R Y

|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
TACACS+
mode,
global configuration
PAT, xlate.
IPSec
IPSec
peers that do not support ESP, which provides both
encryption
and VPN. Refer to the RFC 2402.
Cisco Security Appliance Command Line Configuration Guide
|
X
and RADIUS.
mode,
command-specific
outbound
ACL.
protocol that is less important in most
IP
address,
GL-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents