Glossary
GL-18
Cisco ASA Series CLI Configuration Guide
security context
You can partition a single ASA into multiple virtual firewalls, known as security contexts. Each
context is an independent firewall, with its own security policy, interfaces, and administrators.
Multiple contexts are similar to having multiple stand-alone firewalls.
security services
.
serial transmission
A method of data transmission in which the bits of a data character are transmitted sequentially over
a single channel.
SGCP
Simple Gateway Control Protocol. Controls
gateways by an external call control element (called
a call-agent).
SGSN
Serving GPRS Support Node. The SGSN ensures mobility management, session management, and
packet relaying functions.
SHA-1
Secure Hash Algorithm 1. SHA-1 [NIS94c] is a revision to SHA that was published in 1994. SHA is
closely modeled after MD4 and produces a 160-bit digest. Because SHA produces a 160-bit digest, it
is more resistant to brute-force attacks than 128-bit hashes (such as
), but it is slower. Secure
Hash Algorithm 1 is a joint creation of the National Institute of Standards and Technology and the
National Security Agency. This algorithm, like other hash algorithms, is used to generate a hash value,
also known as a message digest, that acts like a
used in lower-layer protocols to ensure that
message contents are not changed during transmission. SHA-1 is generally considered more secure
than
.
SIP
Session Initiation Protocol. Enables call handling sessions, particularly two-party audio conferences,
or calls. SIP works with
for call signaling.
specifies the ports for the media stream. Using
SIP, the ASA can support any SIP
gateways and
proxy servers.
site-to-site VPN
A site-to-site
peers that connect remote networks into a single
. In this type of
, neither
peer is the destination nor source of user traffic. Instead, each
peer provides encryption and authentication services for hosts on the
s connected to each
peer. The hosts on each
send and receive data through the secure tunnel established by the
pair of
peers.
SKEME
A key exchange protocol that defines how to derive authenticated keying material, with rapid key
refreshment.
SMR
Stub Multicast Routing. SMR allows the ASA to function as a stub router. A stub router is a device
that acts as an
is used to dynamically register specific hosts in a multicast
group on a particular
with a multicast router. Multicast routers route multicast data transmissions
to hosts that are registered to receive specific multimedia or other broadcasts. A stub router forwards
messages between hosts and
s.
SMTP
Simple Mail Transfer Protocol. SMTP is an Internet protocol that supports email services.
SNMP
Simple Network Management Protocol. A standard method for managing network devices using data
structures called Management Information Bases.
split tunneling
Allows a remote
client simultaneous encrypted access to a private network and clear unencrypted
access to the
. If you do not enable split tunneling, all traffic between the
client and the
ASA is sent through an
tunnel. All traffic originating from the
interface through a tunnel, and client access to the
from its remote site is denied.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......