Cisco OL-4015-08 User Manual page 673

Cisco router and security device manager user's guide
Table of Contents

Advertisement

subnet, subnetwork
subnet bits
subnet mask
symmetric key
T
T1
TACACS+
tail-end
TCP
TCP Syn Flood
Attack
Telnet
TFTP
OL-4015-08
In IP networks, a network sharing a particular subnet address. Subnetworks are
networks arbitrarily segmented by the network administrator in order to provide
a multilevel, hierarchical routing structure while shielding the subnetwork from
the addressing complexity of attached networks. See also IP address, subnet bits,
subnet mask.
32-bit address mask used in IP to indicate the bits of an IP address that are being
used for the network and optional subnet address. Subnet masks are expressed
in decimal. The mask 255.255.255.0 specifies that the first 24 bits of the address
Sometimes referred to simply as mask. See also address mask and IP address.
A symmetric key is used to decrypt information that it previously encrypted.
A T1 link is a data link capable of transmitting data at a rate of 1.5 MB per
second.
Terminal Access Controller Access Control System plus. An access server
authentication and accounting protocol that uses TCP as the transport protocol.
The downstream, receive end of a tunnel.
Transmission Control Protocol. Connection-oriented transport layer protocol
that provides reliable full-duplex data transmission
A SYN-flooding attack occurs when a hacker floods a server with a barrage of
requests for connection. Because these messages have unreachable return
addresses, the connections cannot be established. The resulting volume of
unresolved open connections eventually overwhelms the server and can cause it
to deny service to valid requests, thereby preventing legitimate users from
connecting to a website, accessing e-mail, using FTP service, and so on.
A terminal emulation protocol for TCP/IP networks such as the Internet. Telnet
is a common way to control web servers remotely
Trivial File Transfer Protocol. TFTP is a simple protocol used to transfer files.
It runs on UDP and is explained in depth in Request For Comments (RFC) 1350.
Cisco Router and Security Device Manager Version 2.2 User's Guide
Glossary
.
.
GL-31

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents