Security Knowledge Base

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Webinar

 
Labels

Knowledge Base Articles

Description:Complete Definition:RFCs:Also See: Description:A feature to create on overlay IP tunnel network over a base IP network. Complete Definition:IP tunneling is the process of embedding one IP packet inside of another, for the purpose of simul...

Ashley Price by Community Member
  • 2746 Views
  • 0 comments
  • 0 Helpful votes

IntroductionDownload VPN Client SoftwareDocumentationOperating SystemError MessagesThird Party CompatabilityAuthenticationVPN Client Software VersionVPN Client Software ConfigurationNAT/PAT ProblemsMiscellaneousRelated Information IntroductionThis do...

PAWS by Community Member
  • 81478 Views
  • 0 comments
  • 8 Helpful votes

Introduction1. OU-Based Match Example2. Group Membership (memberOf) Example3. AntiVirus, AntiSpyware, Firewall Examples4. Regular Expression matching5. DAP support for Windows 7 and CSD 3.5Further Information and ReferencesNote: Use of ASA security a...

IntroductionSecurity management and monitoring of servicesTechnologies:Cisco Adaptive Security Device Manager ( ASDM )Cisco PIX Device Manager (PDM)Cisco Router and Security Device Manager (SDM)Cisco IP Solution Center Layer 2 VPN Management(ISC)Cis...

Ashley Price by Community Member
  • 2451 Views
  • 0 comments
  • 0 Helpful votes

VTI

Description:Cisco IPSec VPN tunnels on Cisco IOS routers secures endpoints by forming a tunnel and encrypting the traffic within. Setting up these site to site VPNs can be cumbersome and often involves setting up complicated matching crypto maps on b...

ITA Terms by Community Member
  • 4190 Views
  • 0 comments
  • 0 Helpful votes

DescriptionComplete DefinitionRFCs and referencesAlso See: DescriptionSecure Hash Algorithm 2 (SHA-2) Complete DefinitionA cryptographic hash function used for securing information and messages. Generally, SHA-2 consist of SHA-224, SHA-256, SHA-384, ...

ITA Terms by Community Member
  • 11407 Views
  • 0 comments
  • 0 Helpful votes

SHA

DescriptionRFCs and referencesAlso See: DescriptionSecure Hash Algorithm (SHA) The SHA-1 Hash encryption algorithm specifies a Secure Hash Algorithm, which can be used to generate a condensed representation of a message called a message digest. The a...

ITA Terms by Community Member
  • 4763 Views
  • 0 comments
  • 1 Helpful votes

SSL

Introduction:Also See: Introduction:The Secure Socket Layer (SSL) The Secure Socket Layer (SSL) is a protocol that provides secure communication between client and server. Here the client is your browser and server is the web site you're communicatin...

ITA Terms by Community Member
  • 2671 Views
  • 0 comments
  • 0 Helpful votes

SSH

Introduction Configuring SSH on an IOS device  Introduction SSH stands for “Secure Shell”. SSH commonly uses port 22 to connect your computer to another computer on the Internet. It is most often used by network administrators as a remote login / rem...

ITA Terms by Community Member
  • 7832 Views
  • 0 comments
  • 5 Helpful votes

IntroductionWhat is GETVPN?How Group Domain Of Interpretation (GDOI)works?Also See: IntroductionThis document discuss about:What is Group Encrypted Transport VPN (GETVPN)How it WorksWhat is GETVPN?GET (Group Encrypted Transport) VPN is a VPN technolo...

ITA Terms by Community Member
  • 12492 Views
  • 0 comments
  • 0 Helpful votes

DescriptionDecryptionSSL and network monitoring aren’t the most compatible of partners – even with the most sophisticated detection infrastructure in the world, you’ll not derive many useful indicators from the barren randomness of encrypted traffic....

ITA Terms by Community Member
  • 3248 Views
  • 0 comments
  • 0 Helpful votes
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Top Contributors
Featured Article