Security Knowledge Base

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Webinar

 
Labels

Knowledge Base Articles

IntroductionThe CSC-SSM-10 supports:Simultaneous IP connections flowing through the module for 500 usersThe HTTP, FTP, POP3, and SMTP protocols that the module inspects are not always on. Instead, they are intermittent and periodically activated when...

PDM

IntroductionBrowser-based Java application for managing security and monitoring servicesSupported platforms:ALL Cisco PIX 500 series security appliancesSoftware version 6.x seriesFlash Memory minimum requirements8 MBPIX 501, 506 and 506E16 MBPIX 515,...

DescriptionWeb-based management interface for managing security and monitoring servicesSupported platforms:Cisco ASA 5500 series security appliancesASA 5505ASA 5510ASA 5520ASA 5540ASA 5550Cisco PIX 500 series security appliancesPIX 515PIX 515EPIX 525...

SA

Description:1. Service Affecting (SA)2. Security Association (SA)Complete Definition:1. Service Affecting. Category of conditions that interrupt payload traffic. See also NSA (non-service affecting).2. Security Association. A security association (SA...

ITA Terms by Community Member
  • 1754 Views
  • 0 comments
  • 0 Helpful votes

Description:1. A secured communication path between two peers, using encryption protocols (a VPN).2. A non-secured communication path between two peers carrying data over a the base network (may carry data in a different network protocol than the bas...

ITA Terms by Community Member
  • 2807 Views
  • 0 comments
  • 0 Helpful votes

VPN

What is VPN?Types of VPNConclusion:Also See: What is VPN?A VPN (Virtual Private Network) is a way of creating a secure connection to and from a network or computer. VPNs have been used for years, but they have become more robust in recent years. They...

ITA Terms by Community Member
  • 6093 Views
  • 0 comments
  • 0 Helpful votes

DefinitionDigital CertificatesComplete DefinitionDigital Certificates are special encrypted text files that are generated by a trusted Certificate Authority (CA) that encrypt and decrypt the data as part of a Public Key Infrastructure (PKI).  A CA ca...

Ashley Price by Community Member
  • 2975 Views
  • 0 comments
  • 0 Helpful votes

IntroductionContext-based Access Control (CBAC)Context-Based Access Control (CBAC) is a per-application control mechanism that adds advanced traffic filtering functionality to firewalls that isn’t limited, as are access lists, to examining packets at...

ITA Terms by Community Member
  • 5804 Views
  • 0 comments
  • 0 Helpful votes

DefinitionComplete DefinitionRFCsAlso See: DefinitionDiffie-Hellman (DH) Complete DefinitionDiffie-Hellman (DH) is a public-key cryptography protocol that allows two devices to establish a shared secret over an unsecure communications channel (like I...

Ashley Price by Community Member
  • 36530 Views
  • 0 comments
  • 5 Helpful votes

QuestionHave we tested any USB Foot PTT with IPICS PMC Client?AnswerHere are the devices Tested by the BU with the IPICS PMC Client:          FootswitchX-keys Foot Pedal USBhttp://www.xkeys.com/xkeys/xkfoot.phpETChttp://essentialtel.com/etcpages.aspx...

The Cisco® PIX® Device Manager (PDM) provides security management and monitoring services for Cisco PIX security appliances (running Cisco PIX Security Appliance Software Version 6.3 and prior) and the Cisco Catalyst® 6500 Series Firewall Services Mo...

Ashley Price by Community Member
  • 4628 Views
  • 0 comments
  • 0 Helpful votes

What is firewall?Firewalls protect a Network of Computers from being Compromised, Denial of Service and other Attacks from Hackers trying to Intrude the network from outside. A Firewall can be in the form of a Hardware or a Software on a Computer, as...

ITA Terms by Community Member
  • 80315 Views
  • 0 comments
  • 6 Helpful votes

SSL VPN users (both AnyConnect/SVC client and Clientless) can choose which tunnel group (Connection Profile is the object name used in Adaptive Security Device Manager ASDM ) to access using these different methods: group-url group-alias (tunnel gr...

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Top Contributors
Featured Article