Cisco FirePOWER ASA 5500 series Configuration Manual page 945

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

C
Certificate Authority, Certification Authority. A third-party entity that is responsible for issuing and
CA
revoking certificates. Each device with the public key of the CA can authenticate a device that has a
certificate issued by the CA. The term CA also refers to software that provides CA services. See also
certificate, CRL,
A temporary repository of information accumulated from previous task executions that can be reused,
cache
decreasing the time required to perform the tasks. Caching stores frequently reused objects in the system
cache, which reduces the need to perform repeated rewriting and compressing of content.
Cipher Block Chaining. A cryptographic technique that increases the encryption strength of an
CBC
algorithm. CBC requires an initialization vector (IV) to start encryption. The IV is explicitly given in
the
A signed cryptographic object that contains the identity of a user or device and the public key of the
certificate
CA
known to be compromised. Certificates also establish non-repudiation for
means that you can prove to a third party that
Challenge Handshake Authentication Protocol.
CHAP
Common Internet File System. It is a platform-independent file sharing system that provides users with
CIFS
network access to files, printers, and other machine resources. Microsoft implemented CIFS for
networks of Windows computers, however, open source implementations of CIFS provide file access
to servers running other operating systems, such as Linux, UNIX, and Mac OS X.
An application that virtualizes client-server applications and optimizes web applications.
Citrix
command line interface. The primary interface for entering configuration and monitoring commands to
CLI
the security appliance.
Distributed computing (processing) network systems in which transaction responsibilities are divided
client/server
computing
into two parts: client (front end) and server (back end). Also called distributed computing. See also
RPC.
Lets you update revisions of clients to which the update applies; provide a URL or IP address from
Client update
which to get the update; and, in the case of Windows clients, optionally notify users that they should
update their VPN client version.
From global configuration mode, some commands enter a command-specific configuration mode. All
command-specific
configuration mode
user EXEC, privileged EXEC, global configuration, and command-specific configuration commands
are available in this mode. See also
mode.
The process of encoding information using fewer bits or other information-bearing units than an
Compression
unencoded representation would use. Compression can reduce the size of transferring packets and
increase communication performance.
A file on the security appliance that represents the equivalent of settings, preferences, and properties
configuration,
config, config file
administered by
OL-10088-01
public
key, RA.
IPSec
packet.
that issued the certificate. Certificates have an expiration date and may also be placed on a
ASDM
or the CLI.
IKE
negotiation was completed with a specific peer.
global configuration
mode,
Cisco Security Appliance Command Line Configuration Guide
IKE
negotiation, which
privileged EXEC
mode,
user EXEC
Glossary
CRL
if
GL-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents