Glossary

accounts

The capability of ACS to record user sessions in a log file.

ACS System

Administrators with different access privileges defined under the System Configuration section of the ACS

Administrators

web interface. They administer and manage ACS deployments in your network.

ARP

address resolution protocol. A protocol for mapping an Internet Protocol address to a physical machine

 

address that is recognized in the local network. A table, usually called the ARP cache, is used to

 

maintain a correlation between each MAC address and its corresponding IP address. ARP provides the

 

protocol rules for making this correlation and providing address conversion in both directions.

AES

advanced encryption standard. A Federal Information Processing Standard (FIPS) Publication that will

 

specify a cryptographic algorithm for use by U.S. Government organizations to protect sensitive

 

(unclassified) information. This standard specifies Rijndael as a FIPS-approved symmetric encryption

 

algorithm that may be used by U.S. Government organizations (and others) to protect sensitive

 

information.

anonymous (LDAP)

anti-virus

API

applet

ARP

An LDAP session is described as anonymous if no user DN or secret is supplied when initiating the session (sending the bind).

A software program designed to identify and remove a known or potential computer virus

application program interface. The specific methodology by which a programmer writing an application program may make requests of the operating system or another application.

Java programs; an application program that uses the client's web browser to provide a user interface.

Address Resolution Protocol. A protocol used to obtain the physical addresses (such as MAC addresses) of hardware units in a network environment. A host obtains such a physical address by broadcasting an ARP request, which contains the IP address of the target hardware unit. If the request finds a unit with that IP address, the unit replies with its physical hardware address.

ARPANET

Advanced Research Projects Agency Network. A pioneer packet-switched network that was built in the

 

 

 

 

 

 

early 1970s under contract to the US Government, led to the development of today's Internet, and was

 

 

 

 

 

 

decommissioned in June 1990.

Asymmetrical Key

Asymmetric or public key cryptography is based on the concept of a key pair. Each half of the pair (one

Exchange

key) can encrypt information so that only the other half (the other key) can decrypt it. One part of the

 

 

 

 

 

 

key pair, the private key, is known only by the designated owner; the other part, the public key, is

 

 

 

 

 

 

published widely but is still associated with the owner.

attribute (LDAP)

The data in an entry is contained in attribute-value pairs. Each attribute has a name (and sometimes a

 

 

 

 

 

 

short form of the name) and belongs to an objectClass. The attributes characteristics are fully described

 

 

 

 

 

 

by an ASN.1 definition. One or more objectClasses may be included in a Schema. Depending on the

 

 

 

 

 

 

ASN.1 definition of the attribute there can be more that one attribute-value pair of the same named

 

 

 

 

 

 

attribute in an entry. One (or more) attribute(s), the naming attribute or RDN will always uniquely

 

 

 

 

 

 

identify an entry.

auditing

The information gathering and analysis of assets to ensure such things as policy compliance and

 

 

 

 

 

 

security from vulnerabilities.

authenticated

A session is described as authenticated if a user DN and secret is supplied when initiating the session

(LDAP)

(sending the bind).

authentication

The process of confirming the correctness of the claimed identity.

 

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

 

 

 

 

 

 

 

 

 

 

GL-2

 

 

 

 

OL-24201-01

 

 

 

 

 

 

 

Page 622
Image 622
Cisco Systems OL-24201-01 manual Capability of ACS to record user sessions in a log file, GL-2