Security Knowledge Base

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Webinar

 
Labels

Knowledge Base Articles

Introduction 1. OU-Based Match Example 2. Group Membership (memberOf) Example 3. AntiVirus, AntiSpyware, Firewall Examples 4. Regular Expression matching 5. DAP support for Windows 7 and CSD 3.5 Further Information and References Note: Use of ASA sec...

IntroductionSecurity management and monitoring of servicesTechnologies:Cisco Adaptive Security Device Manager ( ASDM )Cisco PIX Device Manager (PDM)Cisco Router and Security Device Manager (SDM)Cisco IP Solution Center Layer 2 VPN Management(ISC)Cis...

Ashley Price by Community Member
  • 2505 Views
  • 0 comments
  • 0 Helpful votes

VTI

Description:Cisco IPSec VPN tunnels on Cisco IOS routers secures endpoints by forming a tunnel and encrypting the traffic within. Setting up these site to site VPNs can be cumbersome and often involves setting up complicated matching crypto maps on b...

ITA Terms by Community Member
  • 4386 Views
  • 0 comments
  • 0 Helpful votes

Description Complete Definition RFCs and references Also See:  DescriptionSecure Hash Algorithm 2 (SHA-2) Complete DefinitionA cryptographic hash function used for securing information and messages. Generally, SHA-2 consist of SHA-224, SHA-256, SHA-3...

ITA Terms by Community Member
  • 12197 Views
  • 0 comments
  • 0 Helpful votes

SHA

Description RFCs and references Also See:  DescriptionSecure Hash Algorithm (SHA) The SHA-1 Hash encryption algorithm specifies a Secure Hash Algorithm, which can be used to generate a condensed representation of a message called a message digest. Th...

ITA Terms by Community Member
  • 5489 Views
  • 0 comments
  • 1 Helpful votes

SSL

Introduction: Also See:  Introduction:The Secure Socket Layer (SSL) The Secure Socket Layer (SSL) is a protocol that provides secure communication between client and server. Here the client is your browser and server is the web site you're communicat...

ITA Terms by Community Member
  • 2802 Views
  • 0 comments
  • 0 Helpful votes

SSH

Introduction Configuring SSH on an IOS device  Introduction SSH stands for “Secure Shell”. SSH commonly uses port 22 to connect your computer to another computer on the Internet. It is most often used by network administrators as a remote login / r...

ITA Terms by Community Member
  • 8415 Views
  • 0 comments
  • 5 Helpful votes

Introduction What is GETVPN? How Group Domain Of Interpretation (GDOI)works? Also See:  IntroductionThis document discuss about:What is Group Encrypted Transport VPN (GETVPN)How it WorksWhat is GETVPN?GET (Group Encrypted Transport) VPN is a VPN tech...

ITA Terms by Community Member
  • 13267 Views
  • 0 comments
  • 0 Helpful votes

DescriptionDecryptionSSL and network monitoring aren’t the most compatible of partners – even with the most sophisticated detection infrastructure in the world, you’ll not derive many useful indicators from the barren randomness of encrypted traffic....

ITA Terms by Community Member
  • 3408 Views
  • 0 comments
  • 0 Helpful votes

SERVER: How To Check the Status of the IPICS License Manager LMR: How do the RMS & LMR Gateways handle Mis-Match Codecs between different Channels? RMS: How many DS0s are used for a VTG that has 6 Channels? PMC: Have we tested any USB Foot PTT wit...

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Top Contributors
Featured Article