Glossary

ISO

International Organization for Standardization, a voluntary, non-treaty, non-government organization,

 

established in 1947, with voting members that are designated standards bodies of participating nations

 

and non-voting observer organizations.

ISP

Internet Service Provider. A business or organization that provides to consumers access to the Internet

 

and related services. In the past, most ISPs were run by the phone companies.

J

JRE

K

Kerberos

key

Java Runtime Environment. A software bundle that allows a computer system to run a Java application.

A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and access control service distributed in a client-server network environment.

In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the text in a given message.

L

Layer 2 Forwarding

An Internet protocol (originally developed by Cisco Corporation) that uses tunneling of PPP over IP

Protocol (L2F)

to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and

 

transparent to the dial-up user.

Layer 2 Tunneling

An extension of the Point-to-Point Tunneling Protocol used by an Internet service provider to enable

Protocol (L2TP)

the operation of a virtual private network over the Internet.

LDAP client

LDAP Client describes a piece of software that provides access to an LDAP sever. Most standard web

 

browsers provide limited LDAP client capabilities using LDAP URLs. LDAP browsers and web

 

interfaces are both very common examples of LDAP clients. List of Open Source Clients.

Lightweight

Directory Access

Protocol (LDAP)

Local Operations (secondary servers only)

Log Configuration

LDAP is a networking protocol for querying and modifying directory services running over TCP/IP The LDAP protocol is used to locate organizations, individuals, and other resources such as files and devices in a network, on the public Internet or on a corporate Intranet.

The operations performed to register or deregister a secondary server, or to replicate a secondary server and a request for a local mode from the Join a Distributed System page.

A system that uses logging categories and maintenance parameters that enable you to configure and store the logs generated for accounting messages, AAA audit and diagnostics messages, system diagnostics messages, and administrative audit messages.

 

User Guide for Cisco Secure Access Control System 5.3

GL-12

OL-24201-01

Page 632
Image 632
Cisco Systems OL-24201-01 manual GL-12