
Glossary
GL-13
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
OSPF
Open Shortest Path First. OSPF is a routing protocol for IP networks. OSPF is a routing protocol
widely deployed in large networks because of its efficient use of network bandwidth and its rapid
convergence after changes in topology. The security appliance supports OSPF.
OU
Organizational Unit. An X.500 directory attribute.
outbound
Refers to traffic whose destination is on an interface with lower security than the source interface.
outbound ACL
An ACL applied to outbound traffic.
outside
The first interface, usually port 0, that connects to other “untrusted” networks outside the security
appliance; the Internet. See also interface, interface names, outbound.
P
PAC
PPTP Access Concentrator. A device attached to one or more PSTN or ISDN lines capable of PPP
operation and of handling the PPTP protocol. The PAC need only implement TCP/IP to pass traffic to
one or more PNSs. It may also tunnel non-IP protocols.
PAT
See Dynamic PAT, interface PAT, and Static PAT.
Perfmon
The security appliance feature that gathers and reports a wide variety of feature statistics, such as
connections/second, xlates/second, etc.
PFS
Perfect Forwarding Secrecy. PFS enhances security by using different security key for the IPSec Phase
1 and Phase 2 SAs. Without PFS, the same security key is used to establish SAs in both phases. PFS
ensures that a given IPSec SA key was not derived from any other secret (like some other keys). In
other words, if someone were to break a key, PFS ensures that the attacker would not be able to derive
any other key. If PFS were not enabled, someone could hypothetically break the IKE SA secret key,
copy all the IPSec protected data, and then use knowledge of the IKE SA secret to compromise the
IPSec SA setup by this IKE SA. With PFS, breaking IKE would not give an attacker immediate access
to IPSec. The attacker would have to break each IPSec SA individually.
Phase 1
See IPSec Phase 1.
Phase 2
See IPSec Phase 2.
PIM
Protocol Independent Multicast. PIM provides a scalable method for determining the best paths for
distributing a specific multicast transmission to a group of hosts. Each host has registered using IGMP
to receive the transmission. See also PIM-SM.
PIM-SM
Protocol Independent Multicast-Sparse Mode. With PIM-SM, which is the default for Cisco routers,
when the source of a multicast transmission begins broadcasting, the traffic is forwarded from one MC
router to the next, until the packets reach every registered host. See also PIM.
Ping
An ICMP request sent by a host to determine if a second host is accessible.
PIX
Private Internet eXchange. The Cisco PIX 500-series security appliances range from compact,
plug-and-play desktop models for small/home offices to carrier-class gigabit models for the most
demanding enterprise and service provider environments. Cisco PIX security appliances provide
robust, enterprise-class integrated network security services to create a strong multilayered defense
for fast changing network environments.
Kommentare zu diesen Handbüchern