Glossary
GL-32
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
S
SA security association. A set of security parameters agreed upon by two peers to
protect a specific session in a particular tunnel. Both IKE and IPSec use SAs,
although SAs are independent of one another.
IPSec SAs are unidirectional and are unique in each security protocol. An IKE
SA is used by IKE only, and unlike the IPSec SA, it is bidirectional. IKE
negotiates and establishes SAs on behalf of IPSec. A user can also establish
IPSec SAs manually.
A set of SAs is needed for a protected data pipe, one per direction per proto col.
For example, if you have a pipe that supports Encapsulating Security Protocol
(ESP) between peers, one ESP SA is required for each direction. SAs are
uniquely identified by destination (IPSec endpoint) address, security protocol
(AH or ESP), and security parameter index (SPI).
SAID security association ID. Numeric identifier for the SA of a given link.
salt A string of pseudorandom characters used to enhance cryptogra phic complexity.
SCCP Skinny Client Control Protocol. SCCP is a proprietary terminal control p rotocol
owned by Cisco Systems. It is used as a messaging protocol between a skinny
client and Cisco CallManager.
SDEE Security Device Event Exchange. A message protocol that can be used to report
on security events, such as alarms generated when a packet matches the
characteristics of a signature.
SDF Signature Definition File. A file, usually in XML format, containing signature
definitions that can be used to load signatures on a security device.
SEAF Signature Event Action Filter. A filter that allows you to subtract actions from
an event whose parameters fall within those defined. For example, a SE AF can
be created to subtract the action Reset TCP Connection from an event associated
with a particular attacker address.