Security Knowledge Base

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Webinar

 
Labels

Knowledge Base Articles

DescriptionDynamic Multipoint VPN (DMVPN)Complete DefinitionDynamic Multipoint VPN enables zero-touch deployment of IPsec encrypted VPN networks. DMVPN Spoke-to-Spoke Functionality is an enhancement that enables the secure exchange of data between tw...

ITA Terms by Community Member
  • 210 Views
  • 0 comments
  • 0 Helpful votes

NAC

IntroductionNetwork Admission Control.                                                                                                              orNetwork Access Control (NAC) solutions deliver a comprehensive approach to identifying, controlling,...

ITA Terms by Community Member
  • 2463 Views
  • 0 comments
  • 0 Helpful votes

TLS

Introduction:Transport Layer Security (TLS).TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences bet...

ITA Terms by Community Member
  • 11410 Views
  • 0 comments
  • 0 Helpful votes

CA

Definition1. Call Appearance (CA) telecommunication term2. Certification Authority (CA) Complete Definition1. Call Appearance (CA) telecommunication term 2. Certificate AuthorityA certificate authority (CA) is an authority in a network that issues an...

ITA Terms by Community Member
  • 2125 Views
  • 0 comments
  • 0 Helpful votes

Introduction:Complete DefinitionAlso See:  Introduction:This document tells you about basics of TACACS+ Complete Definition Terminal Access Controller Access Control System Plus (TACACS+). An extended set of TACACS commands. This is a security applic...

ITA Terms by Community Member
  • 5266 Views
  • 0 comments
  • 0 Helpful votes

Description:Terminal Access Controller Access Control System (TACACS)Terminal Access Controller Access-Control System (TACACS) is a remote authentication protocol that is used to communicatewith an authentication server commonly used in UNIX networks...

ITA Terms by Community Member
  • 4765 Views
  • 0 comments
  • 0 Helpful votes

IntroductionIn DepthRFC:Also See: IntroductionTriple DES (3DES)The Data Encryption Standard (DES) was developed by an IBM team around 1974 and adopted as a national standard in 1977. Triple DES is a minor variation of this standard. It is three times...

ITA Terms by Community Member
  • 11828 Views
  • 0 comments
  • 0 Helpful votes

DescriptionAuthorization is the concept of allowing access to resources only to those permitted to use themBasic concept: "based off who you are - what are you allowed to do"Once upon a time, AAA command authorization in Cisco IOS queried the TACACS+...

ITA Terms by Community Member
  • 2941 Views
  • 0 comments
  • 0 Helpful votes

AES

IntroductionTerminologyFeaturesImplementationsRFCs:Also See: IntroductionThe Advanced Encryption Standard (AES) computer security standard is a symmetric block cipher that encrypts and decrypts 128-bit blocks of data. Standard key lengths of 128, 192...

ITA Terms by Community Member
  • 8305 Views
  • 0 comments
  • 0 Helpful votes

MD5

DescriptionFeatures of MD5RFCsAlso See DescriptionMessage Digest algorithm 5 (MD5) Features of MD5 MD5 (Message-Digest Algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value.MD5 has been employed in a wide variety of secu...

ITA Terms by Community Member
  • 2860 Views
  • 0 comments
  • 0 Helpful votes

DescriptionComplete DefinitionRFCs:Also See: DescriptionInternet Security Association and Key Management Protocol (ISAKMP) Complete DefinitionInternet Security Association and Key Management Protocol (ISAKMP), a key protocol in the IPsec (Internet Se...

ITA Terms by Community Member
  • 11485 Views
  • 0 comments
  • 0 Helpful votes

Introduction:Deep Dive:How IPSec works?RFCs:Also See: Introduction:IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Deep Dive: Earlier security a...

ITA Terms by Community Member
  • 8588 Views
  • 0 comments
  • 0 Helpful votes

Description:OAKLEY protocolComplete Definition:Key establishment is the heart of data protection that relies on cryptography, and it is an essential component of the packet protection mechanisms described in [RFC2401], for example.  A scalable and se...

ITA Terms by Community Member
  • 2469 Views
  • 0 comments
  • 0 Helpful votes

IKE

DescriptionComplete DefinitionRFC:Also See: DescriptionInternet Key Exchange (IKE) Complete DefinitionIKE is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE establishes a shared security policy and authenticat...

ITA Terms by Community Member
  • 2804 Views
  • 0 comments
  • 5 Helpful votes

AAA

What is AAA?AAA Protocols: What is AAA?AAA stands for:AuthenticationAuthorizationAccounting  Authentication  Refers to confirmation that a user who is requesting a service is a valid user.Accomplished via the presentation of an identity and credentia...

ITA Terms by Community Member
  • 7110 Views
  • 0 comments
  • 3 Helpful votes
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Top Contributors
Featured Article