Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 621
GL-1 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 GLOSSARY A AAAAuthentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. These combined processes are considered important for effective network management and security. A system in IP-based networking to control what computer resources users have access to...
Page 622
Glossary GL-2 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 accountsThe capability of ACS to record user sessions in a log file. ACS System AdministratorsAdministrators with different access privileges defined under the System Configuration section of the ACS web interface. They administer and manage ACS deployments in your network. ARPaddress resolution protocol. A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local...
Page 623
Glossary GL-3 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 authenticityThe validity and conformance of the original information. authorizationThe approval, permission, or empowerment for someone or something to do something. authorization profileThe basic permissions container for a RADIUS-based network access service. The authorization profile is where you define all permissions to be granted for a network access request. VLANs, ACLs, URL redirects, session timeout or...
Page 624
Glossary GL-4 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 certificate-based authenticationThe use of Secure Sockets Layer (SSL) and certificates to authenticate and encrypt HTTP traffic. certificateDigital representation of user or device attributes, including a public key, that is signed with an authoritative private key. CGIcommon gateway interface. This mechanism is used by HTTP servers (web servers) to pass parameters to executable scripts in order to generate responses...
Page 625
Glossary GL-5 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 configuration managementThe process of establishing a known baseline condition and managing it. cookieData exchanged between an HTTP server and a browser (a client of the server) to store state information on the client side and retrieve it later for server use. An HTTP server, when sending data to a client, may send along a cookie, which the client retains after the HTTP connection closes. A server can use this mechanism...
Page 626
Glossary GL-6 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 D daemonA program which is often started at the time the system boots and runs continuously without intervention from any of the users on the system. The daemon program forwards the requests to other programs (or processes) as appropriate. The term daemon is a Unix term, though many other operating systems provide support for daemons, though theyre sometimes called other names. Windows, for example, refers to daemons and...
Page 627
Glossary GL-7 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 digital envelopeAn encrypted message with the encrypted session key. digital signatureA hash of a message that uniquely identifies the sender of the message and proves the message hasnt changed since transmission. DSAdigital signature algorithm. An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. The signature is computed using rules and parameters such that the...
Page 628
Glossary GL-8 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 dumpsecA security tool that dumps a variety of information about a systems users, file system, registry, permissions, password policy, and services. DLL Dynamic Link Library. A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. The small program that lets the larger program communicate with a specific device such as a printer or scanner is often...
Page 629
Glossary GL-9 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 EAPExtensible Authentication Protocol. A protocol for wireless networks that expands on Authentication methods used by the PPP (Point-to-Point Protocol), a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and Public Key Encryption authentication. EAP-MD5Extensible Authentication...
Page 630
Glossary GL-10 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 G gatewayA network point that acts as an entrance to another network. global system optionsConfiguring TACACS+, EAP-TTLS, PEAP, and EAP-FAST runtime characteristics and generating EAP-FAST PAC. H hash functionsUsed to generate a one way check sum for a larger text, which is not trivially reversed. The result of this hash function can be used to validate if a larger file has been altered, without having to compare the...