Migration Guide for the Cisco Secure Access Control System 5.2
Glossary
Downloads: This chapterpdf (PDF - 77.0KB) The complete bookPDF (PDF - 7.87MB) | Feedback

Glossary

Table Of Contents


Glossary


A
 
ACL
Access Control List. A list of permissions attached to an object.
ACS
Access Control System.
AD
Active Directory.


C
 
CN
Common Name.


E
 
EAP
Extensible Authentication Protocol. It is an authentication framework frequently used in wireless networks and Point-to-Point connections.
EAP-FAST
Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling. EAP-FAST is compliant with IEEE 802.1X and IEEE 802.11i. Like all EAP types, EAP-FAST can be used with WPA and WPA2 networks.


H
 
HTTPS
Hypertext Transfer Protocol Secure. A URL scheme which is syntactically identical to the HTTP scheme normally used for accessing resources using HTTP. Using an HTTPS: URL indicates that HTTP is to be used, but with a different default port (443) and an additional encryption/authentication layer between HTTP and TCP.


J
 
JDBC
JAVA Database Connectivity. An API for the JAVA programming language that defines how a client may access a database. It provides methods for querying and updating data in a database.


L
 
LDAP
Lightweight Directory Access Protocol. It is an application protocol for querying and modifying data using directory services running over TCP/IP.


M
 
MAC address
Media Access Control address. A quasi-unique identifier assigned by the manufacturer to most network adapters or network interface cards for identification.


N
 
NAP
Network Access Profile.
NDG
Network Device Group.


P
 
PI
Programmatic Interface. A mechanism for external applications to interact with ACS.


R
 
RADIUS
Remote Authentication Dial In User Service. This is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service.


S
 
SOAP
Simple Object Access Protocol. A protocol for exchanging XML-based messages over a computer network, normally using HTTP. SOAP forms the foundation layer of the Web services stack.
SAN
Subject Alternative Name.


T
 
TACACS
Terminal Access Controller Access-Control System. It is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network.


V
 
VSA
Vendor Specific Attribute. A proprietary property or characteristic not provided by the standard RADIUS attribute set. VSAs are defined by vendors of remote access servers to customize RADIUS for their servers.


X
 
XML
Extensible Markup Language.