Appendix A: Glossary
RC4 Rivest Cipher 4. A widely used stream cipher that is used by SSL and WEP. Also called “arcfour.” RC4 is not recommended for use by new systems because it is not very strong cryptographically. For more information, see the Internet Draft at http://www.mozilla.org/projects/security/pki/nss/draft-
remediation The process by which a
remote mirroring Technology that enables you to send mirrored traffic from network devices to a remote analyzer using the network infrastructure rather than a dedicated line.
remote procedure See RPC. call
rootkit Several programs that are secretly installed on a network device after it has been successfully attacked. These programs give an attacker administrator- level access so that they can open network back doors and steal personal or network information. Rootkits are extremely difficult to detect and even more difficult to remove.
RP Radio Port. A “thin” AP that has an antenna and transceiver but that does not store an ACL or other configuration information. RPs are controlled centrally from a module such as Wireless Edge Services Module.
RPC Remote Procedure Call. A procedure to permit arguments or parameters to be sent to a program on a remote system. The remote program executes and returns the results. RPC can be used as an alternative to an agent for testing.
RSA
RSA supports keys between 1024 and 2048 bits long. RSA keys can be used for signing digital certificates. For more information, see the RSA Cryptogra- phy Standard at http://www.rsa.com/rsalabs/node.asp?id=2125.
RSTP Rapid Spanning Tree Protocol. An evolution of STP that provides for faster