Glossary
GL-12
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
ISO International Organization for Standardization, a voluntary, non-treaty, non-government organization,
established in 1947, with voting members that are designated standards bodies of participating nations
and non-voting observer organizations.
ISP Internet Service Provider. A business or organization that provides to consumers access to the Internet
and related services. In the past, most ISPs were run by the phone companies.

J

JRE Java Runtime Environment. A software bundle that allows a computer system to run a Java
application.

K

Kerberos A system developed at the Massachusetts Institute of Technology that depends on passwords and
symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and
access control service distributed in a client-server network environment.
key In cryptography, a key is a variable value that is applied using an algorithm to a string or block of
unencrypted text to produce encrypted text, or to decrypt encrypted text. The length of the key is a
factor in considering how difficult it will be to decrypt the text in a given message.

L

Layer 2 Forwarding
Protocol (L2F)
An Internet protocol (originally developed by Cisco Corporation) that uses tunneling of PPP over IP
to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and
transparent to the dial-up user.
Layer 2 Tunneling
Protocol (L2TP)
An extension of the Point-to-Point Tunneling Protocol used by an Internet service provider to enable
the operation of a virtual private network over the Internet.
LDAP client LDAP Client describes a piece of software that provides access to an LDAP sever. Most standard web
browsers provide limited LDAP client capabilities using LDAP URLs. LDAP browsers and web
interfaces are both very common examples of LDAP clients. List of Open Source Clients.
Lightweight
Directory Access
Protocol (LDAP)
LDAP is a networking protocol for querying and modifying directory services running over TCP/IP
The LDAP protocol is used to locate organizations, individuals, and other resources such as files and
devices in a network, on the public Internet or on a corporate Intranet.
Local Operations
(secondary servers
only)
The operations performed to register or deregister a secondary server, or to replicate a secondary
server and a request for a local mode from the Join a Distributed System page.
Log Configuration A system that uses logging categories and maintenance parameters that enable you to configure and store
the logs generated for accounting messages, AAA audit and diagnostics messages, system diagnostics
messages, and administrative audit messages.