Cisco FirePOWER ASA 5500 series Configuration Manual page 963

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

A method of transporting data in one protocol by encapsulating it in another protocol. Tunneling is
tunnel
used for reasons of incompatibility, implementation simplification, or security. For example, a tunnel
lets a remote
Increases
Turbo ACL
to access the tables in a small, fixed number of lookups, independent of the existing number of
entries.
U
User Datagram Protocol. A connectionless transport layer protocol in the IP protocol stack. UDP is a
UDP
simple protocol that exchanges datagrams without acknowledgments or guaranteed delivery, which
requires other protocols to handle error processing and retransmission. UDP is defined in RFC 768.
Universal Mobile Telecommunication System. An extension of
UMTS
all-IP network by delivering broadband information, including commerce and entertainment services,
to mobile users via fixed, wireless, and satellite networks
Unicast Reverse Path Forwarding. Unicast RPF guards against spoofing by ensuring that packets have
Unicast RPF
a source IP address that matches the correct source interface according to the routing table.
Uniform Resource Locator. A standardized addressing scheme for accessing hypertext documents and
URL
other services using a browser. For example, http://www.cisco.com.
User EXEC mode lets you to see the security appliance settings. The user EXEC mode prompt appears
user EXEC mode
as follows when you first access the security appliance. See also
mode,
Coordinated Universal Time. The time zone at zero degrees longitude, previously called Greenwich
UTC
Mean Time (GMT) and Zulu time. UTC replaced GMT in 1967 as the world time standard. UTC is
based on an atomic time scale rather than an astronomical time scale.
Universal Terrestrial Radio Access Network. Networking protocol used for implementing wireless
UTRAN
networks in UMTS. GTP allows multi-protocol packets to be tunneled through a UMTS/GPRS
backbone between a GGSN, an
User-User Information Element. An element of an
UUIE
the message.
V
Virtual LAN. A group of devices on one or more LANs that are configured (using management
VLAN
software) so that they can communicate as if they were attached to the same physical network cable,
when in fact they are located on a number of different
logical instead of physical connections, they are extremely flexible.
Voice over IP. VoIP carries normal voice traffic, such as telephone calls and faxes, over an IP-based
VoIP
network. DSP segments the voice signal into frames, which then are coupled in groups of two and
stored in voice packets. These voice packets are transported using IP in compliance with ITU-T
specification H.323.
OL-10088-01
VPN
client have encrypted access to a private network.
ACL
lookup speeds by compiling them into a set of lookup tables. Packet headers are used
global configuration
mode, and
SGSN
GPRS
privileged EXEC
mode.
and the UTRAN.
H.225
packet that identifies the users implicated in
LAN
segments. Because VLANs are based on
Cisco Security Appliance Command Line Configuration Guide
networks that moves toward an
command-specific configuration
Glossary
ACL
GL-21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents