DOCUMENT
Cisco Router and Security Device Manager 2.5 User Guide
313 definitions by Cisco Systems, Inc.

3DES802.1xAccess Control, Access Control RuleAccess Control EntryAccess Control ListAccess Control ServerAdaptive Security AlgorithmAddress Resolution ProtocolAddress TranslationAdvanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code ProtocolAggressive ModeAlgorithmAsymmetric EncryptionAsymmetric KeysAsynchronous Transfer ModeAuthenticationAuthentication HeaderAuthentication Header ProtocolBasic Service Set IdentifierBootstrap ProtocolBurst RateBurst RateCA CertificateCacheCentral ManagerCertificate Enrollment ProtocolCertificate IdentityCertificate Revocation ListCertificate Revocation List Distribution PointCertification AuthorityCertification Authority serverChallenge Handshake Authentication ProtocolChargenChecksumCisco Call Manager ExpressCisco Common Classification Policy LanguageCisco Discovery ProtocolCisco Encryption TechnologyCisco Networking ServicesCisco Router and Security Device ManagerCisco Tunneling Control ProtocolClass-Based Weighted Fair QueuingClass MapClear ChannelClient/Server ComputingCommand-line InterfaceCommitted BurstCommitted Information RateConfiguration, Config, Config FileContent EngineContext-based Access ControlCookieCryptographyCrypto MapData ConfidentialityData Encryption StandardData IntegrityData-link Connection IdentifierDead Peer DetectionDecryptionDefault GatewayDelta FileDemilitarized ZoneDifferentiated Services Code PointDiffie-HellmanDiffie-Hellman Key ExchangeDigital CertificateDigital SignatureDigital Signature StandardDistinguished NameDistributed KeyDomain NameDomain Name SystemDynamic Host Configuration ProtocolDynamic Multipoint Virtual Private NetworkDynamic Port Address TranslationDynamic RoutingDynamic Virtual Tunnel InterfaceE1Easy VPNeDonkeyEncapsulating Security PayloadEncapsulationEncryptEncryptionEnhanced Interior Gateway Routing ProtocolEnrollment Proxy HostEnrollment URLesp-3desesp-desESP-MD5-HMACesp-nullESP_SEALESP-SHA-HMACEthernetEvent Action OverrideEvent Risk RatingException ListExcess BurstExpiration DateExtended RulesExtensible Authentication Protocol-Flexible Authentication via Secure TunnelingExtensible Authentication Protocol over User Datagram ProtocolFasttrackFidelity RatingFile Transfer ProtocolFingerFingerprintFirewallFlash MemoryGeneric Routing EncapsulationGlobal IKE PolicyGnutellaG.SHDSLH.323HashHash AlgorithmHash-based Message Authentication CodeHashed Message Authentication Codes with MD5High-Level Data Link ControlHostHTTP, HTTPSHubIdentical AddressingIDS Device ManagerIDS SensorIKE NegotiationIKE ProfileImplicit RuleInside GlobalInside LocalInspection RuleInstant MessagingIntegrated Routing and BridgingInterfaceInternetInternet Control Message ProtocolInternet Group Management ProtocolInternet Key ExchangeInternet Message Access ProtocolInternet ProtocolInternet Security Association Key Management ProtocolIntrusion Detection SystemiOSIOS IPSIP AddressIPSECIPSec PolicyIPSec RuleKeyKey AgreementKey EscrowKey ExchangeKey LifetimeKey RecoveryL2TP Access ConcentratorL2TP Network ServerLayer 2 Forwarding ProtocolLayer 2 Tunneling ProtocolLayer 3 InterfaceLocal Area Networklocal Subnetlogical InterfaceLoopbackLow Latency QueuingMask, Subnet Mask, Netmask, Network MaskMaximum Transmission UnitMessage Authentication CodeMessage DigestMessage Digest 5Message Digest 5Net FlowNetworkNetwork Access DeviceNetwork Access ServerNetwork Address TranslationNetwork Admission ControlNetwork-based Application RecognitionstNetwork BitsNetwork ModuleNetwork Time ProtocolNext Hop Resolution ProtocolNon-repudiation ServiceOakleyOpen Shortest Path FirstOutput FeedbackOutside GlobalOutside LocalPacket Assembler/DisassemblerPaddingParameter MapPasswordPassword AgingPassword Authentication ProtocolPeerPeer-to-peerPerfect Forward SecrecyPermanent Virtual CircuitPhysical InterfacePingPoint-to-Point ProtocolPoint-to-Point Protocol over Asynchronous Transfer ModePoint-to-Point Protocol over EthernetPoint-to-Point Tunneling ProtocolPolice RatePolicingPolicy MapPort to Application MappingPost Office Protocol version 3PosturePre-shared KeyPrivacy Enhanced MailPseudo RandomPublic Key Cryptography Standard Number 12Public Key EncryptionPublic-key InfrastructureQuality of ServiceQueuingQuick ModeRegistration AuthorityRemote Authentication Dial-In User ServiceRemote Copy ProtocolRemote Procedure CallRemote SubnetReplay-detectionRepudiationRevocation PasswordRFC 1483 RoutingRisk RatingRivest, Shamir, and AdelmanRoot Certification AuthorityRoute MapRouting Information ProtocolRSA KeysRSA SignaturesRuleSaltSecure Device ProvisioningSecure Hashing AlgorithmSecure Hashing Algorithm 1Secure ShellSecure Socket LayerSecure Socket Layer Virtual Private NetworksSecurity AssociationSecurity Device Event ExchangeSelective Packed DiscardService Set IdentifierSession Initiation ProtocolShapingshared KeySignatureSignature EngineSignature Event Action FilterSignature Event Action OverrideSignature Event Action ProcessorSignature Fidelity RatingSigning CertificateSimple Mail Transfer ProtocolSimple Network Management ProtocolSingle DMVPNSite-to-site VPNSkinny Client Control ProtocolSource-route BridgingSplit DNSSpokeSpoof, SpoofingSSL VPN ContextSSL VPN GatewaySSL VPN Group PolicyStandard RuleState, Stateful, Stateful InspectionStatic Port Address TranslationStatic RouteSubnet Bits, Subnet MaskSubnet, SubnetworkSUN Remote Procedure CallSymmetric KeyT1Target Value RatingTCP Syn Flood AttackTELNETTerminal Access Controller Access Control System PlusTraffic Flow Confidentiality or Traffic AnalysisTransformTransform SetTransmission Control ProtocolTunnelTunnelingUniform Resource IdentifierUniversal Resource LocatorUser Datagram ProtocolVirtual Channel IdentifierVirtual Fragment ReassemblyVirtual Private NetworkVirtual Type TerminalVoice Over IPVPN ConnectionVPN Mirror PolicyWAE-CoreWAE-EdgeWeb Cache Communication ProtocolWeighted Fair QueuingWide Area Application ServicesWide Area NetworkWi-Fi MultimediaWildcard MaskWindows Internet Naming ServiceX.509X.509 CertificateX.509 Certificate Revocation ListXAuthZoneZone-Based Policy Firewall
Loading conversations.
Date
2015-02-21
Related Entities