Privileged exec mode, Public key, Privileged – Cisco ASA 5505 User Manual

Page 1953: Exec mode, Pptp, Netw

Advertising
background image

Glossary

GL-15

Cisco ASA 5500 Series Configuration Guide using the CLI

PPTP

Point-to-Point Tunneling Protocol. PPTP was introduced by Microsoft to provide secure remote
access to Windows networks; however, because it is vulnerable to attack, PPTP is commonly used
only when stronger security methods are not available or are not required. PPTP Ports are pptp,
1723/tcp, 1723/udp, and pptp. For more information about PPTP, see RFC 2637. See also

PAC

,

PPTP

GRE

,

PPTP GRE tunnel

,

PNS

,

PPTP session

, and

PPTP TCP

.

PPTP GRE

Version 1 of GRE for encapsulating PPP traffic.

PPTP GRE tunnel

A tunnel defined by a

PNS

-

PAC

pair. The tunnel protocol is defined by a modified version of

GRE

.

The tunnel carries

PPP

datagrams between the

PAC

and the

PNS

. Many sessions are multiplexed on a

single tunnel. A control connection operating over

TCP

controls the establishment, release, and

maintenance of sessions and of the tunnel itself.

PPTP session

PPTP

is connection-oriented. The

PNS

and

PAC

maintain the state for each user that is attached to a

PAC

. A session is created when an end-to-end

PPP

connection is attempted between a dial-up user and

the

PNS

. The datagrams related to a session are sent over the tunnel between the

PAC

and

PNS

.

PPTP TCP

Standard

TCP

session over which

PPTP

call control and management information is passed. The

control session is logically associated with, but separate from, the sessions being tunneled through a

PPTP

tunnel.

preshared key

A preshared key provides a method of

IKE

authentication that is suitable for networks with a limited,

static number of

IPsec

peers. This method is limited in scalability because the key must be configured

for each pair of

IPsec

peers. When a new

IPsec

peer is added to the network, the preshared key must

be configured for every

IPsec

peer with which it communicates. Using

certificate

s and

CA

s provides

a more scalable method of

IKE

authentication.

primary, primary
unit

The ASA normally operating when two units, a primary and secondary, are operating in failover mode.

privileged EXEC
mode

The highest privilege level at the ASA CLI. Any user EXEC mode command will work in privileged
EXEC mode. The privileged EXEC mode prompt appears as follows after you enter the enable
command:

hostname> enable

hostname#

See also

command-specific configuration mode

,

global configuration mode

,

user EXEC mode

.

protocol, protocol
literals

A standard that defines the exchange of packets between network nodes for communication. Protocols
work together in layers. Protocols are specified in the ASA configuration as part of defining a security
policy by their literal values or port numbers. Possible ASA protocol literal values are ahp, eigrp, esp,
gre, icmp, igmp, igrp, ip, ipinip, ipsec, nos, ospf, pcp, snp, tcp, and udp.

Proxy-ARP

Enables the ASA to reply to an

ARP

request for IP addresses in the global pool. See also

ARP

.

public key

A public key is one of a pair of keys that are generated by devices involved in public key infrastructure.
Data encrypted with a public key can only be decrypted using the associated private key. When a
private key is used to produce a digital signature, the receiver can use the public key of the sender to
verify that the message was signed by the sender. These characteristics of key pairs provide a scalable
and secure method of authentication over an insecure media, such as the

Internet

.

Advertising