Cisco ROUTER-SDM-CD User Manual page 961

User guide
Table of Contents

Advertisement

esp-null
ESP-SHA-HMAC
Ethernet
Event action
override
event action
override
expiration date
exception list
extended rules
SDP
F
fasttrack
OL-4015-12
ESP (Encapsulating Security Payload) transform that provides no encryption
and no confidentiality.
ESP (Encapsulating Security Payload) transform using the HMAC-variant SHA
authentication algorithm.
A widely used LAN protocol invented by Xerox Corporation, and developed by
Xerox, Intel, and Digital Equipment Corporation. Ethernet networks use
CSMA/CD, and run over a variety of cable types at 10 Mbps, or at 100 Mbps.
Ethernet is similar to the IEEE 802.3 series of standards.
Event action overrides are used in IOS IPS 5.x. They allow you to change the
actions associated with an event based on the
The expiration date within a certificate or key indicates the end of its limited
lifetime. The certificate or key is not trusted after its expiration date passes.
In a
NAC
implementation, a list of hosts with static addresses that are allowed
to bypass the NAC process. These hosts may be placed on the exception list
because they do not have
as printers or Cisco IP phones.
A type of Access rule. Extended rules extended rules can examine a greater
variety of packet fields to determine a match. Extended rules can examine both
the packet's source and destination IP addresses, the protocol type, the source
and destination ports, and other packet fields.
Secure Device Provisioning. SDP uses Trusted Transitive Introduction (TTI) to
easily deploy public key infrastructure (PKI) between two end devices, such as
a Cisco IOS client and a Cisco IOS certificate server.
A file-sharing network in which indexing functions are dynamically assigned to
connected peers, called supernodes.
Cisco Router and Security Device Manager 2.5 User's Guide
RR
posture
agents installed, or because they are hosts such
Glossary
of that event.
GL-13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents