E also, Ip address, Ipsec – Cisco ASA 5505 User Manual

Page 1948: Jtapi, Applications. ctiqbe is, Peers. d, Card, Frame, Isakmp, Not a

Advertising
background image

Glossary

GL-10

Cisco ASA 5500 Series Configuration Guide using the CLI

intranet

Intranetwork. A LAN that uses

IP

. See also

network

and

Internet

.

IP

Internet Protocol. IP protocols are the most popular nonproprietary protocols because they can be used
to communicate across any set of interconnected networks and are equally well suited for

LAN

and

WAN

communications.

IPS

Intrusion Prevention Service. An in-line, deep-packet inspection-based solution that helps mitigate a
wide range of network attacks.

IP address

An IP protocol address. A ASA interface ip_address. IP version 4 addresses are 32 bits in length. This
address space is used to designate the network number, optional subnetwork number, and a host
number. The 32 bits are grouped into four octets (8 binary bits), represented by 4 decimal numbers
separated by periods, or dots. The meaning of each of the four octets is determined by their use in a
particular network.

IP pool

A range of local IP addresses specified by a name, and a range with a starting IP address and an ending
address. IP pools are used by

DHCP

and

VPN

s to assign local IP addresses to clients on the inside

interface.

IPsec

IP Security. A framework of open standards that provides data confidentiality, data integrity, and data
authentication between participating peers. IPsec provides these security services at the IP layer. IPsec
uses

IKE

to handle the negotiation of protocols and algorithms based on local policy and to generate

the encryption and authentication keys to be used by IPsec. IPsec can protect one or more data flows
between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.

IPsec Phase 1

The first phase of negotiating

IPsec

, includes the key exchange and the

ISAKMP

portions of

IPsec

.

IPsec Phase 2

The second phase of negotiating

IPsec

. Phase 2 determines the type of encryption rules used for

payload, the source and destination that will be used for encryption, the definition of interesting traffic
according to access lists, and the

IPsec

peer.

IPsec

is applied to the interface in Phase 2.

IPsec transform set

A transform set specifies the

IPsec

protocol, encryption algorithm, and hash algorithm to use on traffic

matching the

IPsec

policy. A transform describes a security protocol (

AH

or

ESP

) with its

corresponding algorithms. The

IPsec

protocol used in almost all transform sets is

ESP

with the

DES

algorithm and HMAC-SHA for authentication.

ISAKMP

Internet Security Association and Key Management Protocol. A protocol framework that defines
payload formats, the mechanics of implementing a key exchange protocol, and the negotiation of a
security association. See

IKE

.

ISP

Internet Service Provider. An organization that provides connection to the

Internet

via their services,

such as modem dial in over telephone voice lines or

DSL

.

J

JTAPI

Java Telephony Application Programming Interface. A Java-based API supporting telephony
functions. See also

TAPI

.

Advertising