Glossary
Hypertext Transfer Protocol. A protocol used by browsers and web servers to transfer files. When a
HTTP
user views a web page, the browser can use HTTP to request and receive the files used by the web
page. HTTP transmissions are not encrypted.
HTTP over SSL. An SSL-encrypted version of HTTP.
HTTPS
I
Internet Assigned Number Authority. Assigns all port and protocol numbers for use on the Internet.
IANA
Internet Control Message Protocol. Network-layer Internet protocol that reports errors and provides
ICMP
other information relevant to IP packet processing.
The Internet Engineering Task Force. A technical standards organization that develops
IETF
documents defining protocols for the Internet.
Internet Group Management Protocol. IGMP is a protocol used by IPv4 systems to report IP
IGMP
memberships to neighboring multicast routers.
Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services
IKE
(such as IPSec) that require keys. Before any
identity of its peer. This can be done by manually entering preshared keys into both hosts or by a
service. IKE is a hybrid protocol that uses part
SKEME
defined in RFC 2409.
IKE Extended Authenticate (Xauth) is implemented per the IETF draft-ietf-ipsec-isakmp-xauth-04.txt
IKE Extended
("extended authentication" draft). This protocol provides the capability of authenticating a user within
Authentication
IKE using
IKE Mode Configuration is implemented per the IETF draft-ietf-ipsec-isakmp-mode-cfg-04.txt. IKE
IKE Mode
Mode Configuration provides a method for a security gateway to download an IP address (and other
Configuration
network level configuration) to the VPN client as part of an IKE negotiation.
Internet Locator Service. ILS is based on LDAP and is ILSv2 compliant. ILS was developed by
ILS
Microsoft for use with its NetMeeting, SiteServer, and Active Directory products.
Internet Message Access Protocol. Method of accessing e-mail or bulletin board messages kept on a
IMAP
mail server that can be shared. IMAP permits client e-mail applications to access remote message
stores as if they were local without actually transferring the message.
An access rule automatically created by the FWSM based on default rules or as a result of user-defined
implicit rule
rules.
International Mobile Subscriber Identity. One of two components of a
IMSI
the NSAPI. See also NSAPI.
The first interface, usually port 1, that connects your internal, "trusted" network protected by the
inside
FWSM. See also interface,
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
GL-8
inside
ISAKMP
framework. This is the protocol formerly known as ISAKMP/Oakley, and is
TACACS+
or RADIUS.
interface
IPSec
traffic can be passed, each FWSM must verify the
Oakley
and part of another protocol suite called
names.
RFC
multicast
GTP
tunnel ID, the other being
OL-20748-01
CA