GL-13
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
Glossary
headend The upstream, transmit end of a tunnel.
HMAC Hash-based Message Authentication Code. HMAC is a mechanism for message
authentication using cryptographic hash functions. HMAC can be used with any
iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a
secret shared key. The cryptographic strength of HMAC depends on the
properties of the underlying hash function.
HMAC-MD5 Hashed Message Authentication Codes with MD5 (RFC 2104). A keyed version
of MD5 that enables two parties to validate transmitted information using a
shared secret.
host A computer, such as a PC, or other computing device, such as a server,
associated with an individual IP address and optionally a name. The name for
any device on a TCP/IP network that has an IP address. Also any
network-addressable device on any network. The term node includes devices
such as routers and printers which would not normally be called hosts.
HTTP, HTTPS Hypertext Transfer Protocol, Hypertext Transfer Protocol, Secure. The protocol
used by Web browsers and Web servers to transfer files, such as text and graphic
files.
hub In a DMVPN network, a hub is a router with a point-to-point IPSec connection
to all spoke routers in the network. The hub is the logical center of a DMVPN
network.
I
ICMP Internet Control Message Protocol. Network layer Internet protocol that r eports
errors and provides other information relevant to IP packet processing.
IDS Intrusion Detection System. The Cisco IPS performs a real time analysis of
network traffic to find anomalies and misuse, using a library of signatures it can
compare traffic against. When it finds unauthorized ac tivity or anomalies, it can
terminate the condition, block traffic from attacking hosts, and send alerts to the
IDM.