Cisco ROUTER-SDM-CD User Manual page 956

User guide
Table of Contents

Advertisement

Glossary
crypto map
cTCP
D
data confidentiality
data integrity
data origin
authentication
decryption
default gateway
delta file
DES
DHCP
Cisco Router and Security Device Manager 2.5 User's Guide
GL-8
In Cisco SDM, crypto maps specify which traffic should be protected by IPSec,
where IPSec-protected traffic should be sent, and what IPSec transform sets
should be applied to this traffic.
Cisco Tunneling Control Protocol. cTCP is also called
traversal. cTCP is a protocol that encapsulates
header, so that firewalls in between the client and the server or headend device
permit this traffic, considering it as TCP traffic.
The result of data encryption that prevents the disclosure of information to
unauthorized individuals, entities, or processes. This information can be either
data at the application level, or communication parameters. See
confidentiality or traffic
The presumed accuracy of transmitted data — signifying the sender's
authenticity and the absence of data tampering.
One function of a non-repudiation service.
Reverse application of an encryption algorithm to encrypted data, thereby
restoring that data to its original, unencrypted state.
The gateway of last resort. The gateway to which a packet is routed when its
destination address does not match any entries in the routing table.
A file that Cisco IOS IPS creates to store changes made to signatures.
Data Encryption Standard. Standard cryptographic algorithm developed and
standardized by the U.S. National Institute of Standards and Technology (NIST).
Uses a secret 56-bit encryption key. The DES algorithm is included in many
encryption standards.
Dynamic Host Configuration Protocol. Provides a mechanism for allocating IP
addresses to hosts dynamically, so that addresses can be reused when hosts no
longer need them.
analysis.
TCP
over IPSec, or TCP
ESP
and
IKE
traffic in the TCP
traffic flow
OL-4015-12

Advertisement

Table of Contents
loading

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents