GL-11
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
Glossary
extended rules A type of Access rule. Extended rules extended rules can examine a greater
variety of packet fields to determine a match. Extended rules can examine both
the packets source and destination IP addresses, the protocol type, the source
and destination ports, and other packet fields.
SDP Secure Device Provisioning. SDP uses Trusted Transitive Introduction (TTI) to
easily deploy public key infrastructure (PKI) between two end devices, such as
a Cisco IOS client and a Cisco IOS certificate server.
F
finger A software tool for determining whether a person has an account at a particular
Internet site. Many sites do not a llow incoming finger requests.
fingerprint The fingerprint of a CA certificate is the string of alpha numeric characters that
results from an MD5 hash of the whole CA certificate. Entities receiving a CA
certificate can verify its authenticity by comparing it to its known fingerprint.
This authentication is intended to ensure the integrity of communication
sessions by preventing man-in-the-middle attacks.
firewall A router or access server, or several routers or access servers, designated as a
buffer between any connected public networks and a private network. A firewall
router uses access lists and other methods to ensure the security of the private
network.
Flash, Flash memory A memory chip which retains data without power. Software images can be stored
in, booted from, and written to Flash as necessary.
Frame Relay Industry standard, switched data link layer protocol that handles multiple virtual
circuits using HDLC encapsulation between connected devices. Frame Relay is
more efficient than X.25, the protocol for which it is general ly considered a
replacement.
FTP File Transfer Protocol. Part of the TCP/IP protocol stack, used for tran sferring
files between hosts.