User`s guide

Glossary
GL-16
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
IPSec
A framework of open standards that provides data confidentiality, data integrity,
and data authentication between participating peers. IPSec provides these
security services at the IP layer. IPSec uses IKE to handle negotiation of
protocols and algorithms based on local policy and to generate the encryption
and authentication keys to be used by IPSec. IPSec can be used to protect one or
more data flows between a pair of hosts, between a pair of security gateways, or
between a security gateway and a host.
IPSec policy
In SDM, an IPSec policy is a named set of crypto map associated with a VPN
connection.
IPSec rule
A rule used to specify which traffic is protected by IPSec.
IRB
Integrated Routing and Bridging. IRB allows you to route a given
protocol between routed interfaces and bridge groups within a single
switch router.
ISAKMP
The Internet Security Association Key Management Protocol is the basis for
IKE. ISAKMP authenticates communicating peers, creates and manages
security associations, and defines key generation techniques.
K
key
A string of bits used to encrypt or decrypt data, or to compute message digests.
key agreement
The process whereby two or more parties agree to use the same secret symmetric
key.
key escrow
A trusted third party who holds the cryptographic keys.
key exchange
The method by which two or more parties exchange encryption keys. The IKE
protocol provides one such method.
key lifetime
An attribute of a key pair that specifies a time span, during which the certificate
containing the public component of that key pair is considered valid.
key management
The creation, distribution, authentication, and storage of encryption keys.