Security Knowledge Base

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Webinar

 
Labels

Knowledge Base Articles

DescriptionComplete DefinitionRFCs:Also See: DescriptionInternet Security Association and Key Management Protocol (ISAKMP) Complete DefinitionInternet Security Association and Key Management Protocol (ISAKMP), a key protocol in the IPsec (Internet Se...

ITA Terms by Community Member
  • 16720 Views
  • 0 comments
  • 0 Helpful votes

Introduction:Deep Dive:How IPSec works?RFCs:Also See: Introduction:IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Deep Dive: Earlier security a...

ITA Terms by Community Member
  • 8943 Views
  • 0 comments
  • 0 Helpful votes

Description:OAKLEY protocolComplete Definition:Key establishment is the heart of data protection that relies on cryptography, and it is an essential component of the packet protection mechanisms described in [RFC2401], for example.  A scalable and se...

ITA Terms by Community Member
  • 2685 Views
  • 0 comments
  • 0 Helpful votes

IKE

DescriptionComplete DefinitionRFC:Also See: DescriptionInternet Key Exchange (IKE) Complete DefinitionIKE is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE establishes a shared security policy and authenticat...

ITA Terms by Community Member
  • 3057 Views
  • 0 comments
  • 5 Helpful votes

AAA

What is AAA?AAA Protocols: What is AAA?AAA stands for:AuthenticationAuthorizationAccounting  Authentication  Refers to confirmation that a user who is requesting a service is a valid user.Accomplished via the presentation of an identity and credentia...

ITA Terms by Community Member
  • 7308 Views
  • 0 comments
  • 3 Helpful votes

PKI

DescriptionPublic-Key Infrastructure (PKI)Complete DefinitionPublic Key Infrastructure or PKI can be a very complex but important subject. We’ll give you a PKI overview to help you understand what PKI is and how it can help you. PKI is a loaded term ...

ITA Terms by Community Member
  • 2849 Views
  • 0 comments
  • 0 Helpful votes

Description:This document discuss about peer.Complete Definition:A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network. Each computer...

ITA Terms by Community Member
  • 1735 Views
  • 0 comments
  • 0 Helpful votes

ACL

Introduction What does an Access Control List of?RFCsAlso See Introduction What are Access Control Lists? ACLs are a network filter utilized by routers and some switches to permit and restrict data flows into and out of network interfaces. When an AC...

ITA Terms by Community Member
  • 9997 Views
  • 0 comments
  • 0 Helpful votes

ESP

DescriptionComplete DefinitionRFC:Also See: Description1. Extended Services Processor (ESP)2. Encapsulating Security Payload (ESP) Complete Definition1. Extended Services Processor. Encapsulating Security Payload The ESP header is designed to provide...

ITA Terms by Community Member
  • 21609 Views
  • 0 comments
  • 0 Helpful votes

RA

Description:Registration Authority (RA) (also know as a LRA - Local Registration Authority)Complete Definition:An RA is an optional PKI entity (separate from the CAs) that does not sign either Digital Certificates or CRLs but has responsibility for r...

ITA Terms by Community Member
  • 3743 Views
  • 0 comments
  • 0 Helpful votes

QUESTION:I have a couple of questions concerning codec selection as it relates to LMR gateways and on the RMS.* If a customer has set specific codec parameters on their LMR gateways (codec sampling rate / payload size, ect, LMR example config below);...

DescriptionThe Cisco ASA 5500 Series Content Security and Control Security Services Module (CSC-SSM) delivers industry-leading threat protection and content control at the Internet edge providing comprehensive anti virus, anti-spyware, file blocking,...

IntroductionThe CSC-SSM-20 supports:Simultaneous IP connections flowing through the module for 1000 usersThe HTTP, FTP, POP3, and SMTP protocols that the module inspects are not always on. Instead, they are intermittent and periodically activated whe...

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Top Contributors
Featured Article