Rule, Secret key, Is shared only betwee – Cisco ASA 5505 User Manual
Page 1955: Blish, S in, Secret, Setu
Glossary
GL-17
Cisco ASA 5500 Series Configuration Guide using the CLI
RSH
Remote Shell. A protocol that allows a user to execute commands on a remote system without having
to log in to the system. For example, RSH can be used to remotely examine the status of a number of
access servers without connecting to each communication server, executing the command, and then
disconnecting from the communication server.
RTCP
RTP Control Protocol. Protocol that monitors the
of an IPv6
connection and conveys
information about the ongoing session. See also
.
RTP
Real-Time Transport Protocol. Commonly used with IP networks. RTP is designed to provide
end-to-end network transport functions for applications transmitting real-time data, such as audio,
video, or simulation data, over multicast or unicast network services. RTP provides such services as
payload type identification, sequence numbering, timestamping, and delivery monitoring to real-time
applications.
RTSP
Real Time Streaming Protocol. Enables the controlled delivery of real-time data, such as audio and
video. RTSP is designed to work with established protocols, such as
and
rule
Conditional statements added to the ASA configuration to define security policy for a particular
situation. See also
,
.
running
configuration
The configuration currently running in RAM on the ASA. The configuration that determines the
operational characteristics of the ASA.
S
SA
security association. An instance of security policy and keying material applied to a data flow. SAs
are established in pairs by
peers during both phases of
. SAs specify the encryption
algorithms and other security parameters used to create a secure tunnel. Phase 1 SAs (
SAs)
establish a secure tunnel for negotiating Phase 2 SAs. Phase 2 SAs (
SAs) establish the secure
tunnel used for sending user data. Both
and
use SAs, although SAs are independent of one
SAs are unidirectional and they are unique in each security protocol. A set of SAs are
needed for a protected data pipe, one per direction per protocol. For example, if you have a pipe that
supports
between peers, one
SA is required for each direction. SAs are uniquely identified
by destination (
endpoint) address, security protocol (
or
), and Security Parameter Index.
negotiates and establishes SAs on behalf of
. A user can also establish
SAs manually.
An
SA is used by
only, and unlike the
SCCP
Skinny Client Control Protocol. A Cisco-proprietary protocol used between Cisco Call Manager and
Cisco
phones.
SCEP
Simple Certificate Enrollment Protocol. A method of requesting and receiving (also known as
enrolling) certificates from
s.
SDP
Session Definition Protocol. An
protocol for the definition of Multimedia Services. SDP
messages can be part of
and
messages.
secondary unit
The backup ASA when two are operating in failover mode.
secret key
A secret key is a key shared only between the sender and receiver. See