Cisco PIX 525 Spezifikationen Seite 586

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 604
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 585
Glossary
GL-18
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
SIP
Session Initiation Protocol. Enables call handling sessions, particularly two-party audio conferences,
or “calls.” SIP works with SDP for call signaling. SDP specifies the ports for the media stream. Using
SIP, the security appliance can support any SIP Vo I P gateways and Vo I P proxy servers.
site-to-site VPN
A site-to-site VPN is established between two IPSec peers that connect remote networks into a single
VPN. In this type of VPN, neither IPSec peer is the destination or source of user traffic. Instead, each
IPSec peer provides encryption and authentication services for hosts on the LANs connected to each
IPSec peer. The hosts on each LAN send and receive data through the secure tunnel established by the
pair of IPSec peers.
SKEME
A key exchange protocol that defines how to derive authenticated keying material, with rapid key
refreshment.
SMR
Stub Multicast Routing. SMR allows the security appliance to function as a “stub router.” A stub
router is a device that acts as an IGMP proxy agent. IGMP is used to dynamically register specific
hosts in a multicast group on a particular LAN with a multicast router. Multicast routers route
multicast data transmissions to hosts that are registered to receive specific multimedia or other
broadcasts. A stub router forwards IGMP messages between hosts and MC routers.
SMTP
Simple Mail Transfer Protocol. SMTP is an Internet protocol that supports email services.
SNMP
Simple Network Management Protocol. A standard method for managing network devices using data
structures called Management Information Bases.
split tunneling
Allows a remote VPN client simultaneous encrypted access to a private network and clear unencrypted
access to the Internet. If you do not enable split tunneling, all traffic between the VPN client and the
security appliance is sent through an IPSec tunnel. All traffic originating from the VPN client is sent
to the outside interface through a tunnel, and client access to the Internet from its remote site is denied.
spoofing
A type of attack designed to foil network security mechanisms such as filters and access lists. A
spoofing attack sends a packet that claims to be from an address from which it was not actually sent.
SQL*Net
Structured Query Language Protocol. An Oracle protocol used to communicate between client and
server processes.
SSH
Secure Shell. An application running on top of a reliable transport layer, such as TCP/IP, that provides
strong authentication and encryption capabilities.
SSL
Secure Sockets Layer. A protocol that resides between the application layer and TCP/IP to provide
transparent encryption of data traffic.
standby unit
See secondary unit.
stateful inspection
Network protocols maintain certain data, called state information, at each end of a network connection
between two hosts. State information is necessary to implement the features of a protocol, such as
guaranteed packet delivery, data sequencing, flow control, and transaction or session IDs. Some of the
protocol state information is sent in each packet while each protocol is being used. For example, a
browser connected to a web server uses HTTP and supporting TCP/IP protocols. Each protocol layer
maintains state information in the packets it sends and receives. The security appliance and some other
firewalls inspect the state information in each packet to verify that it is current and valid for every
protocol it contains. This is called stateful inspection and is designed to create a powerful barrier to
certain types of computer security threats.
Seitenansicht 585
1 2 ... 581 582 583 584 585 586 587 588 589 590 591 ... 603 604

Kommentare zu diesen Handbüchern

Keine Kommentare