GL-13
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Glossary
esp-null ESP (Encapsulating Security Payload) transform that provides no encryption
and no confidentiality.
ESP-SHA-HMAC ESP (Encapsulating Security Payload) transform using the HMAC-variant SHA
authentication algorithm.
Ethernet A widely used LAN protocol invented by Xerox Corporation, and developed by
Xerox, Intel, and Digital Equipment Corporation. Ethernet networ ks use
CSMA/CD, and run over a variety of cable types at 10 Mbps, or at 100 Mbps.
Ethernet is similar to the IEEE 802.3 series of standards.
Event action
override
event action
override
Event action overrides are used in IOS IPS 5.x. They allow you to change the
actions associated with an event based on the RR of that event.
expiration date The expiration date within a certificate or key indicates the end of its limited
lifetime. The certificate or key is not trusted after its expiration date passes.
exception list In a NAC implementation, a list of hosts with static addresses that are allowed
to bypass the NAC process. These hosts may be placed on the exception list
because they do not have posture agents installed, or because they are hosts such
as printers or Cisco IP phones.
extended rules A type of Access rule. Extended rules extended ru les can examine a greater
variety of packet fields to determine a match. Extended rules can examine both
the packet’s source and destination IP addresses, the protocol type, the source
and destination ports, and other packet fields.
SDP Secure Device Provisioning. SDP uses Trusted Transitive Introduction (TTI) to
easily deploy public key infrastructure (PKI) between two end devices, such as
a Cisco IOS client and a Cisco IOS certificate server.
F
fasttrack A file-sharing network in which indexing functions are dynamically assigned to
connected peers, called supernodes.