Cisco Systems 2.5 Network Router User Manual


  Open as PDF
of 1002
 
GL-19
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Glossary
IP address
IP version 4 addresses are 32 bits, or 4 bytes, in length. This address “space” is
used to designate the network number, the optional subnetwork number, and a
host number. The 32 bits are grouped into four octets (8 binary bits), represented
by 4 decimal numbers separated by periods or “dots.” The part of the address
used to specify the network number, the subnetwork number, and the host
number is specified by the subnet mask.
IPSec
A framework of open standards that provides data confidentiality, data integrity,
and data authentication between participating peers. IPSec provides these
security services at the IP layer. IPSec uses IKE to handle negotiation of
protocols and algorithms based on local policy and to generate the encryption
and authentication keys to be used by IPSec. IPSec can be used to protect one or
more data flows between a pair of hosts, between a pair of security gateways, or
between a security gateway and a host.
IPSec policy
In Cisco SDM, an IPSec policy is a named set of crypto map associated with a
VPN connection.
IPSec rule
A rule used to specify which traffic is protected by IPSec.
IRB
Integrated Routing and Bridging. IRB allows you to route a given protocol
between routed interfaces and bridge groups within a single switch router.
ISAKMP
The Internet Security Association Key Management Protocol is the basis for
IKE. ISAKMP authenticates communicating peers, creates and manages
security associations, and defines key generation techniques.
K
kazaa2
A peer-to-peer file sharing service.
key
A string of bits used to encrypt or decrypt data, or to compute message digests.
key agreement
The process whereby two or more parties agree to use the same secret symmetric
key.
key escrow
A trusted third party who holds the cryptographic keys.