
Glossary
GL-8
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
I
IANA
Internet Assigned Number Authority. Assigns all port and protocol numbers for use on the Internet.
ICMP
Internet Control Message Protocol. Network-layer Internet protocol that reports errors and provides
other information relevant to IP packet processing.
IDS
Intrusion Detection System. A method of detecting malicious network activity by signatures and then
implementing a policy for that signature.
IETF
The Internet Engineering Task Force. A technical standards organization that develops RFC
documents defining protocols for the Internet.
IGMP
Internet Group Management Protocol. IGMP is a protocol used by IPv4 systems to report IP multicast
memberships to neighboring multicast routers.
IKE
Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services
(such as IPSec) that require keys. Before any IPSec traffic can be passed, each security appliance must
verify the identity of its peer. This can be done by manually entering preshared keys into both hosts
or by a CA service. IKE is a hybrid protocol that uses part Oakley and part of another protocol suite
called SKEME inside ISAKMP framework. This is the protocol formerly known as ISAKMP/Oakley,
and is defined in RFC 2409.
IKE Extended
Authentication
IKE Extended Authenticate (Xauth) is implemented per the IETF draft-ietf-ipsec-isakmp-xauth-04.txt
(“extended authentication” draft). This protocol provides the capability of authenticating a user within
IKE using TACACS+ or RADIUS.
IKE Mode
Configuration
IKE Mode Configuration is implemented per the IETF draft-ietf-ipsec-isakmp-mode-cfg-04.txt. IKE
Mode Configuration provides a method for a security gateway to download an IP address (and other
network level configuration) to the VPN client as part of an IKE negotiation.
ILS
Internet Locator Service. ILS is based on LDAP and is ILSv2 compliant. ILS was developed by
Microsoft for use with its NetMeeting, SiteServer, and Active Directory products.
IMAP
Internet Message Access Protocol. Method of accessing e-mail or bulletin board messages kept on a
mail server that can be shared. IMAP permits client e-mail applications to access remote message
stores as if they were local without actually transferring the message.
implicit rule
An access rule automatically created by the security appliance based on default rules or as a result of
user-defined rules.
IMSI
International Mobile Subscriber Identity. One of two components of a GTP tunnel ID, the other being
the NSAPI. See also NSAPI.
inside
The first interface, usually port 1, that connects your internal, “trusted” network protected by the
security appliance. See also interface, interface names.
Kommentare zu diesen Handbüchern