Glossary
GL-32
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
traffic flow
confidentiality or
traffic analysis
Security concept that prevents the unauthorized disclosure of communication
parameters. The successful implementation of this concept hides source and
destination IP addresses, message length, and frequency of communication from
unauthorized parties
transform Description of a security protocol and its corresponding algor ithms.
transform set A transform set is an acceptable combination of security protocols, algorithms
and other settings to apply to IPSec protected traffic. During the IPSec security
association negotiation, the peers agree to use a particular transform set when
protecting a particular data flow.
tunnel A virtual channel through a shared medium such as the Internet, used for the
exchange of encapsulated data packets.
tunneling The process of piping the stream of one protocol through another protocol.
U
UDP User Datagram Protocol. Connectionless transport layer protocol in the TCP/IP
protocol that belongs to the Internet protocol family.
unencrypted Not encrypted.
Unity Client A client of a Unity Easy VPN Server.
URL Universal Resource Locator. A standardized addressing scheme for accessing
hypertext documents and other services using a browser, for example,
http://www.cisco.com.
V
verification Identity confirmation of a person or process.
VCI virtual channel identifier. A virtual path may carry multiple virtual channels
corresponding to individual connections. The VCI identifies the channel being
used. The combination of VPI and VCI identifies an ATM connection.