Glossary
GL-16
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
IPSec A framework of open standards that provides data confidentiality, data integrity,
and data authentication between participating peers. IPSec provides these
security services at the IP layer. IPSec uses IKE to handle negotiation of
protocols and algorithms based on local policy and to generate th e encryption
and authentication keys to be used by IPSec. IPSec can be used to protect one or
more data flows between a pair of hosts, between a pair of security ga teways, or
between a security gateway and a host.
IPSec policy In SDM, an IPSec policy is a named set of crypto map associated with a VPN
connection.
IPSec rule A rule used to specify which traffic is protected by IPSec.
IRB Integrated Routing and Bridging. IRB allows you to route a given
protocol between routed interfaces and bridge groups within a single switch router.
ISAKMP The Internet Security Association Key Management Protocol is the ba sis for
IKE. ISAKMP authenticates communicating peers, creates and manages
security associations, and defines key generation techniques.
K
key A string of bits used to encrypt or decrypt data, or to compute message digests.
key agreement The process whereby two or more parties agree to use the same secret symmetric
key.
key escrow A trusted third party who holds the cryptographic keys.
key exchange The method by which two or more parties exchange encryption keys. The IKE
protocol provides one such method.
key lifetime An attribute of a key pair that specifies a time span, during which the certificate
containing the public component of that key pair is considered valid.
key management The creation, distribution, authentication, and storage of encryption keys.