TMS zl Management and Configuration Guide ST.1.0.090213

B-1
B
Glossary
Numeric
3DES Triple DES. A version of DES in which three encryption phases are applied.
A
AAA Authentication, Authorization, and Accounting. Processes that are used to
control network access and enforce security policies. For more information,
see RFC 2989 at http://www.ietf.org/rfc/rfc2989.txt. See also authentication,
authorization, and accounting.
ABR Area Border Router. A router that is attached to more than one OSPF area.
access policy See firewall access policy.
active-standby
mode
An HA mode in which the master performs the workload, and the other member
of the cluster takes over the workload only if the master fails.
address group A group of address objects in a single named object.
address object A named object that contains a type of address: single IP, IP range, network, or
hostname. Address objects can be single-entry or multiple-entry.
administrative
distance
The administrative distance for a protocol indicates how reliable the router
considers routes discovered by that protocol to be. The lower the administra-
tive distance, the more trusted the route.
Advanced
Encryption
Standard
See AES.
AES Advanced Encryption Standard. A published symmetric encryption algo-
rithm used for IPsec that uses a 128-bit, 192-bit, or 256-bit symmetric key to
encrypt data in 128-bit blocks.
AES-XCBC Advanced Encryption Standard with Extended Cipher Block Chaining. An
authentication algorithm that uses a pseudo-random function used to create IKE
keys.