The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The following table provides an alphabetical listing of MSX acronyms.
Acronym |
Definition |
---|---|
AAA | Authentication, Authorization, and Accounting |
ACL | Access List |
API | Application Programmable Interface |
ARPU | Average Revenue Per User |
ASAv | Adaptive Security Appliance - vFW VNF |
BGP | Border Gateway Protocol |
BSS | Business Support System |
CDB | Configuration Database |
CFS | Consumer Facing Service |
CLI | Configuration Line Interface |
CMSP | Cisco Cloud and Managed Service Program |
CPE | Customer Premise Equipment (ISR-G2) |
CRUD | Create, Read, Update, and Delete orchestration operations |
CSR | Cloud Service Router - vRouter VNF |
cURL | Client URL |
DC | Data Center |
DCI | Data Center Interconnect |
DEST | Destination IP Address |
DHCP | Dynamic Host Configuration Protocol |
DMVPN | Dynamic Multi-Point Virtual Private Network |
DMZ | Demilitarized Zone (Networking private to public) |
DNS | Domain Name System |
DST | Destination IP Address |
EIGRP | Enhanced Interior Gateway Routing Protocol |
ESC | Elastic Services Controller |
ETS | European Telecommunications Standards |
ETSI | European Telecommunications Standards Institute |
EzVPN | Easy Virtual Private Network |
FW | Firewall |
GraphDB | Graph Data Base |
GuestOS | Guest Operating System |
HA | High Availability is |
HDR | Header |
HTTP | Hypertext Transfer Protocol |
I2RS | Interface to Routing System (diagram format) |
IKEv2 | Internet Key Exchange version 2 |
IO | Input/Output |
Intrusion Detection | Generally refers to the process of passively analyzing network traffic for potential intrusions and storing attack data for security analysis. |
Intrusion Prevention | Includes the concept of intrusion detection, but adds the ability to block or alter malicious traffic as it travels across your network |
iOS | Cisco Operating System |
IP | Internet Protocol |
IPSec | Internet Protocol Secure |
ISR | Integrated Service Router |
IT | Information Technology |
KVM | Kernel-based Virtual Machine |
LAN | Local Area Network |
ML2 | Modular Layer 2 |
MPLS | Multiprotocol Label Switching |
MSX | Managed Services Accelerator |
NAT | Network Address Translation |
NAT44 | Network Address Translation IPv4-to-IPv4 |
NED | Network Element Driver |
NEDs | Network Element Drivers |
NETCONF | Network Configuration protocol |
NFV | Network Functions Virtualization |
NH | Next Hope |
NIC | Network Interface Card |
NICs | Network Interface Cards |
NSO | Network Service Orchestrator |
ODL | Open Daylight |
OS | Operating System |
OSPF | Open Shortest Path First |
OSS | Operations Support System |
OVS | Open Virtual Switch |
PE | Provider Edge |
PnP | Plug-N-Play |
QEMU | Quick Emulator |
QoS | Quality of Service |
RA | Remote Access |
REST | Representation State Transfer |
RFC | Request For Comments |
RFS | Resource Facing Service |
ROI | Return on Investment |
SA | Source Address |
SDN | Solution uses software-defined networking |
SLA | Service Level Agreement |
SMB | Small Medium Business |
SNMP | Simple Network Management Protocol |
SP | Service Provider |
SRC | Source IP Address |
SSH | Secure Shell |
SSL | Secure Sockets layer |
SUDI | Secure Unique Device Identifier |
TCO | Total Cost of Ownership |
TP | Termination Point |
UCS | Unified Computing System |
vFW | Virtual Firewall |
VIM | Virtual Interface Manager |
VirtIO | Virtual Input/Output |
VLAN | Virtual Local Area Network |
VM | Virtual Machine |
VMs | Virtual Machines |
VNF | Virtual Network Function |
VNFs | Virtual Network Functions |
VNIC | Virtual Network Interface |
VPN | Virtual Private Network |
VPP | Vector Packet Parsing |
VR | Virtual Router |
VRF | Virtual Route Forwarding |
VRRP | Virtual Registry Registrar Protocol |
WAN | Wide Area Network |
WCCPv2 | Web Cache Communications Protocol |
WSA | Web Security Appliance |
WSAv | Web Security Appliance virtualized |
XML | eXtensible Marking Language |
YANG | Yet Another Next Generation (data modeling) |
ZTD | Zero Touch Deployment |