Glossary, L o s s a r y – Cisco ASA 5505 User Manual

Page 1939

Advertising
background image

GL-1

Cisco ASA 5500 Series Configuration Guide using the CLI

G L O S S A R Y

Numerics

|

A

|

B

|

C

|

D

|

E

|

F

|

G

|

H

|

I

|

J

|

K

|

L

|

M

|

N

|

O

|

P

|

Q

|

R

|

S

|

T

|

U

|

V

|

W

|

X

Numerics

3DES

See

DES

.

A

AAA

Authentication, authorization, and accounting. See also

TACACS+

and

RADIUS

.

ABR

Area Border Router. In

OSPF

, a router with interfaces in multiple areas.

ACE

access control entry. Information entered into the configuration that lets you specify what type of traffic
to permit or deny on an

interface

. By default, traffic that is not explicitly permitted is denied.

Access Modes

The ASA CLI uses several command modes. The commands available in each mode vary. See also

user

EXEC mode

,

privileged EXEC mode

,

global configuration mode

,

command-specific configuration mode

.

ACL

access control list. A collection of

ACE

s. An ACL lets you specify what type of traffic to allow on an

interface. By default, traffic that is not explicitly permitted is denied. ACLs are usually applied to the

interface

which is the source of inbound traffic. See also

rule

,

outbound ACL

.

ActiveX

A set of object-oriented programming technologies and tools used to create mobile or portable
programs. An ActiveX program is roughly equivalent to a Java applet.

Address Resolution
Protocol

See

ARP

.

address translation

The translation of a network address and/or port to another network address/or port. See also

IP address

,

interface PAT

,

NAT

,

PAT

,

Static PAT

,

xlate

.

AES

Advanced Encryption Standard. A symmetric block cipher that can encrypt and decrypt information.
The AES algorithm is capable of using cryptographic keys of 128, 192 and 256 bits to encrypt and
decrypt data in blocks of 128 bits. See also

DES

.

AH

Authentication Header. An IP protocol (type 51) that can ensure data integrity, authentication, and
replay detection. AH is embedded in the data to be protected (a full IP datagram, for example). AH can
be used either by itself or with

ESP

. AH is an older

IPsec

protocol that is less important in most

networks than

ESP

. AH provides authentication services but does not provide encryption services. It is

provided to ensure compatibility with

IPsec

peers that do not support

ESP

, which provides both

authentication

and

encryption

. See also

encryption

and

VPN

. Refer to the RFC 2402.

AIP

Advanced Inspection and Prevention. For example, the AIP SSM or AIP SSC, which runs IPS software.

Advertising