|
|
|
Internet Assigned Number Authority. Assigns all port and protocol numbers for use on the
Internet.
|
|
Internet Control Message Protocol. Network-layer Internet protocol that reports errors and provides other information relevant to IP packet processing.
|
|
Intrusion Detection System. A method of detecting malicious network activity by signatures and then implementing a policy for that signature.
|
|
The Internet Engineering Task Force. A technical standards organization that develops
RFC documents defining protocols for the
Internet.
|
|
Internet Group Management Protocol. IGMP is a protocol used by IPv4 systems to report IP
multicast memberships to neighboring multicast routers.
|
|
Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services (such as
IPSec) that require keys. Before any
IPSec traffic can be passed, each security appliance must verify the identity of its peer. This can be done by manually entering preshared keys into both hosts or by a
CA service. IKE is a hybrid protocol that uses part
Oakley and part of another protocol suite called
SKEME inside
ISAKMP framework. This is the protocol formerly known as ISAKMP/Oakley, and is defined in RFC 2409.
|
IKE Extended Authentication
|
IKE Extended Authenticate (Xauth) is implemented per the IETF draft-ietf-ipsec-isakmp-xauth-04.txt ("extended authentication" draft). This protocol provides the capability of authenticating a user within IKE using
TACACS+ or
RADIUS.
|
|
IKE Mode Configuration is implemented per the IETF draft-ietf-ipsec-isakmp-mode-cfg-04.txt. IKE Mode Configuration provides a method for a security gateway to download an IP address (and other network level configuration) to the VPN client as part of an IKE negotiation.
|
|
Internet Locator Service. ILS is based on LDAP and is ILSv2 compliant. ILS was developed by Microsoft for use with its NetMeeting, SiteServer, and Active Directory products.
|
|
Internet Message Access Protocol. Method of accessing e-mail or bulletin board messages kept on a mail server that can be shared. IMAP permits client e-mail applications to access remote message stores as if they were local without actually transferring the message.
|
|
An access rule automatically created by the security appliance based on default rules or as a result of user-defined rules.
|
|
International Mobile Subscriber Identity. One of two components of a
GTP tunnel ID, the other being the
NSAPI. See also
NSAPI.
|
|
The first interface, usually port 1, that connects your internal, "trusted" network protected by the security appliance. See also
interface,
interface names.
|
|
The security appliance inspects certain application-level protocols to identify the location of embedded addressing information in traffic. This allows
NAT to translate these embedded addresses and to update any checksum or other fields that are affected by the translation. Because many protocols open secondary
TCP or
UDP ports, each application inspection engine also monitors sessions to determine the port numbers for secondary channels. The initial session on a well-known port is used to negotiate dynamically assigned port numbers. The application inspection engine monitors these sessions, identifies the dynamic port assignments, and permits data exchange on these ports for the duration of the specific session. Some of the protocols that the security appliance can inspect are
CTIQBE,
FTP,
H.323,
HTTP,
MGCP,
SMTP, and
SNMP.
|
|
The physical connection between a particular network and a security appliance.
|
|
The IP address of a security appliance network interface. Each interface IP address must be unique. Two or more interfaces must not be given the same IP address or IP addresses that are on the same IP network.
|
|
Human readable name assigned to a security appliance network interface. The inside interface default name is "inside" and the outside interface default name is "outside." Any perimeter interface default names are "intf
n", such as intf2 for the first perimeter interface, intf3 for the second perimeter interface, and so on to the last interface. The numbers in the intf string corresponds to the position of the interface card in the security appliance. You can use the default names or, if you are an experienced user, give each interface a more meaningful name. See also
inside,
intfn,
outside.
|
|
Any interface, usually beginning with port 2, that connects to a subset network of your design that you can custom name and configure.
|
|
|
|
|
|
|
|
Internet Protocol. IP protocols are the most popular nonproprietary protocols because they can be used to communicate across any set of interconnected networks and are equally well suited for
LAN and
WAN communications.
|
|
Intrusion Prevention Service. An in-line, deep-packet inspection-based solution that helps mitigate a wide range of network attacks.
|
|
An IP protocol address. A security appliance interface ip_address. IP version 4 addresses are 32 bits in length. This address space is used to designate the network number, optional subnetwork number, and a host number. The 32 bits are grouped into four octets (8 binary bits), represented by 4 decimal numbers separated by periods, or dots. The meaning of each of the four octets is determined by their use in a particular network.
|
|
A range of local IP addresses specified by a name, and a range with a starting IP address and an ending address. IP Pools are used by
DHCP and
VPNs to assign local IP addresses to clients on the inside interface.
|
|
IP Security. A framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers. IPSec provides these security services at the IP layer. IPSec uses
IKE to handle the negotiation of protocols and algorithms based on local policy and to generate the encryption and authentication keys to be used by IPSec. IPSec can protect one or more data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
|
|
The first phase of negotiating
IPSec, includes the key exchange and the
ISAKMP portions of
IPSec.
|
|
The second phase of negotiating
IPSec. Phase two determines the type of encryption rules used for payload, the source and destination that will be used for encryption, the definition of interesting traffic according to access lists, and the
IPSec peer.
IPSec is applied to the interface in Phase 2.
|
|
A transform set specifies the
IPSec protocol, encryption algorithm, and hash algorithm to use on traffic matching the
IPSec policy. A transform describes a security protocol (
AH or
ESP) with its corresponding algorithms. The
IPSec protocol used in almost all transform sets is
ESP with the
DES algorithm and HMAC-SHA for authentication.
|
|
Internet Security Association and Key Management Protocol. A protocol framework that defines payload formats, the mechanics of implementing a key exchange protocol, and the negotiation of a security association. See
IKE.
|
|
Internet Service Provider. An organization that provides connection to the
Internet via their services, such as modem dial in over telephone voice lines or
DSL.
|