Glossary
GL-10
Cisco ASA Series CLI Configuration Guide
intranet
Intranetwork. A LAN that uses
. See also
and
IP
Internet Protocol. IP protocols are the most popular nonproprietary protocols because they can be used
to communicate across any set of interconnected networks and are equally well suited for
and
communications.
IPS
Intrusion Prevention Service. An in-line, deep-packet inspection-based solution that helps mitigate a
wide range of network attacks.
IP address
An IP protocol address. A ASA interface ip_address. IP version 4 addresses are 32 bits in length. This
address space is used to designate the network number, optional subnetwork number, and a host
number. The 32 bits are grouped into four octets (8 binary bits), represented by 4 decimal numbers
separated by periods, or dots. The meaning of each of the four octets is determined by their use in a
particular network.
IP pool
A range of local IP addresses specified by a name, and a range with a starting IP address and an ending
address. IP pools are used by
and
s to assign local IP addresses to clients on the inside
interface.
IPsec
IP Security. A framework of open standards that provides data confidentiality, data integrity, and data
authentication between participating peers. IPsec provides these security services at the IP layer. IPsec
uses
to handle the negotiation of protocols and algorithms based on local policy and to generate
the encryption and authentication keys to be used by IPsec. IPsec can protect one or more data flows
between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
IPsec Phase 1
The first phase of negotiating
, includes the key exchange and the
portions of
.
IPsec Phase 2
The second phase of negotiating
. Phase 2 determines the type of encryption rules used for
payload, the source and destination that will be used for encryption, the definition of interesting traffic
according to access lists, and the
peer.
is applied to the interface in Phase 2.
IPsec transform set
A transform set specifies the
protocol, encryption algorithm, and hash algorithm to use on traffic
matching the
policy. A transform describes a security protocol (
or
) with its
corresponding algorithms. The
protocol used in almost all transform sets is
with the
algorithm and HMAC-SHA for authentication.
ISAKMP
Internet Security Association and Key Management Protocol. A protocol framework that defines
payload formats, the mechanics of implementing a key exchange protocol, and the negotiation of a
security association. See
ISP
Internet Service Provider. An organization that provides connection to the
via their services,
such as modem dial in over telephone voice lines or
J
JTAPI
Java Telephony Application Programming Interface. A Java-based API supporting telephony
functions. See also
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......