GL-33
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Glossary
SEAO Signature Event Action Override. An SEAO allows you to assign a risk rating
(RR) range to an IPS event action type, such as alarm. If an event occurs with an
RR in the range you have assigned to the action type, then that action is added
to the event. In this case, an alarm would be added to the event.
SEAP Signature Event Action Processor. SEAP allows filtering and overrides based on
Event Risk Rating (ERR) feedback.
secret key See symmetric key.
security association
lifetime
The predetermined length of time in which an SA is in effect.
security zone A group of interfaces to which a policy can be applied. Securit y zones should
consist of interfaces that share similar functions or features. For example, on a
router, interfaces Ethernet 0/0 and Ethernet 0/1 may be connect ed to the local
LAN. These two interfaces are similar because they represent the internal
network, so they can be grouped into a zone for firewall configurations.
session key A key that is used only once.
SFR Signature Fidelity Rating. A weight associated with how well this signature
might perform in the absence of specific knowledge of the target.
SHA Some encryption systems use the Secure Hashing Algorithm to generate digital
signatures, as an alternative to MD5.
SHA-1 Secure Hashing Algorithm 1. Algorithm that takes a message of less than 264
bits in length and produces a 160-bit message digest. The large messa ge digest
provides security against brute-force collision and inversion attacks. SHA-1
[NIS94c] is a revision to SHA that was published in 1994.
shaping Traffic shaping retains excess packets in a queue and then reschedules the excess
for later transmission over increments of time.
shared key The secret key that all users share in a symmetric key-based communication
session.
shared secret A crytographic key.