Home > Cisco > Control System > Cisco Acs 5x User Guide

Cisco Acs 5x User Guide

Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.

Page 621

GL-1
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
GLOSSARY
A
AAAAuthentication, authorization, and accounting (AAA) is a term for a framework for intelligently 
controlling access to computer resources, enforcing policies, auditing usage, and providing the 
information necessary to bill for services. These combined processes are considered important for 
effective network management and security. A system in IP-based networking to control what computer 
resources users have access to...

Page 622

Glossary
GL-2
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
accountsThe capability of ACS to record user sessions in a log file. 
ACS System 
AdministratorsAdministrators with different access privileges defined under the System Configuration section of the ACS 
web interface. They administer and manage ACS deployments in your network.
ARPaddress resolution protocol. A protocol for mapping an Internet Protocol address to a physical machine 
address that is recognized in the local...

Page 623

Glossary
GL-3
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
authenticityThe validity and conformance of the original information.
authorizationThe approval, permission, or empowerment for someone or something to do something. 
authorization profileThe basic permissions container for a RADIUS-based network access service. The authorization 
profile is where you define all permissions to be granted for a network access request. VLANs, ACLs, 
URL redirects, session timeout or...

Page 624

Glossary
GL-4
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
certificate-based 
authenticationThe use of Secure Sockets Layer (SSL) and certificates to authenticate and encrypt HTTP traffic.
certificateDigital representation of user or device attributes, including a public key, that is signed with an 
authoritative private key. 
CGIcommon gateway interface. This mechanism is used by HTTP servers (web servers) to pass parameters 
to executable scripts in order to generate responses...

Page 625

Glossary
GL-5
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
configuration 
managementThe process of establishing a known baseline condition and managing it.
cookieData exchanged between an HTTP server and a browser (a client of the server) to store state information 
on the client side and retrieve it later for server use. An HTTP server, when sending data to a client, 
may send along a cookie, which the client retains after the HTTP connection closes. A server can use 
this mechanism...

Page 626

Glossary
GL-6
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
D
daemonA program which is often started at the time the system boots and runs continuously without 
intervention from any of the users on the system. The daemon program forwards the requests to other 
programs (or processes) as appropriate. The term daemon is a Unix term, though many other operating 
systems provide support for daemons, though theyre sometimes called other names. Windows, for 
example, refers to daemons and...

Page 627

Glossary
GL-7
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
digital envelopeAn encrypted message with the encrypted session key.
digital signatureA hash of a message that uniquely identifies the sender of the message and proves the message hasnt 
changed since transmission.
 DSAdigital signature algorithm. An asymmetric cryptographic algorithm that produces a digital signature 
in the form of a pair of large numbers. The signature is computed using rules and parameters such that 
the...

Page 628

Glossary
GL-8
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
dumpsecA security tool that dumps a variety of information about a systems users, file system, registry, 
permissions, password policy, and services.
DLL Dynamic Link Library. A collection of small programs, any of which can be called when needed by a 
larger program that is running in the computer. The small program that lets the larger program 
communicate with a specific device such as a printer or scanner is often...

Page 629

Glossary
GL-9
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
EAPExtensible Authentication Protocol. A protocol for wireless networks that expands on Authentication 
methods used by the PPP (Point-to-Point Protocol), a protocol often used when connecting a computer 
to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart 
cards, certificates, one-time passwords, and Public Key Encryption authentication. 
EAP-MD5Extensible Authentication...

Page 630

Glossary
GL-10
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
G
gatewayA network point that acts as an entrance to another network.
global system 
optionsConfiguring TACACS+, EAP-TTLS, PEAP, and EAP-FAST runtime characteristics and generating 
EAP-FAST PAC. 
H
hash functionsUsed to generate a one way check sum for a larger text, which is not trivially reversed. The result 
of this hash function can be used to validate if a larger file has been altered, without having to compare 
the...
Start reading Cisco Acs 5x User Guide

Related Manuals for Cisco Acs 5x User Guide

All Cisco manuals