Cisco ASA 5505 Configuration Manual page 1775

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

C
Certificate Authority, Certification Authority. A third-party entity that is responsible for issuing and
CA
revoking certificates. Each device with the public key of the CA can authenticate a device that has a
certificate issued by the CA. The term CA also refers to software that provides CA services. See also
certificate, CRL,
A temporary repository of information accumulated from previous task executions that can be reused,
cache
decreasing the time required to perform the tasks. Caching stores frequently reused objects in the system
cache, which reduces the need to perform repeated rewriting and compressing of content.
Cipher Block Chaining. A cryptographic technique that increases the encryption strength of an
CBC
algorithm. CBC requires an initialization vector (IV) to start encryption. The IV is explicitly given in
the
IPsec
A signed cryptographic object that contains the identity of a user or device and the public key of the
certificate
CA
known to be compromised. Certificates also establish non-repudiation for
means that you can prove to a third party that
Challenge Handshake Authentication Protocol.
CHAP
Common Internet File System. It is a platform-independent file sharing system that provides users with
CIFS
network access to files, printers, and other machine resources. Microsoft implemented CIFS for
networks of Windows computers, however, open source implementations of CIFS provide file access
to servers running other operating systems, such as Linux, UNIX, and Mac OS X.
An application that virtualizes client-server applications and optimizes web applications.
Citrix
command-line interface. The primary interface for entering configuration and monitoring commands
CLI
to the adaptive security appliance.
Distributed computing (processing) network systems in which transaction responsibilities are divided
client/server
into two parts: client (front end) and server (back end). Also called distributed computing. See also
computing
RPC.
Lets you update revisions of clients to which the update applies; provide a URL or IP address from
Client update
which to get the update; and, in the case of Windows clients, optionally notify users that they should
update their VPN client version.
From global configuration mode, some commands enter a command-specific configuration mode. All
command-specific
user EXEC, privileged EXEC, global configuration, and command-specific configuration commands
configuration mode
are available in this mode. See also
mode.
The process of encoding information using fewer bits or other information-bearing units than an
compression
unencoded representation would use. Compression can reduce the size of transferring packets and
increase communication performance.
A file on the adaptive security appliance that represents the equivalent of settings, preferences, and
configuration,
config, config file
properties administered by
OL-20339-01
public
key, RA.
packet.
that issued the certificate. Certificates have an expiration date and may also be placed on a
ASDM
IKE
negotiation was completed with a specific peer.
global configuration
mode,
or the CLI.
Cisco ASA 5500 Series Configuration Guide using ASDM
IKE
negotiation, which
privileged EXEC
mode,
user EXEC
Glossary
CRL
if
GL-3

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents