TMS zl Management and Configuration Guide ST.1.1.100226
B-26
Glossary
RIP Routing Information Protocol. A protocol that allows routers to tell other
routers which routers they can reach and how far away those routers are. For
more information, see RFC 1058 for version 1 at http://www.ietf.org/rfc/
rfc1058.txt or RFC 2453 for version 2 at http://www.ietf.org/rfc/rfc2453.txt.
route computation The process of adding route costs in OSPF to find the shortest route to an
arbitrary destination.
route
redistribution
The process of using routes discovered by a different protocol. For example,
RIP can redistribute routes discovered by OSPF, so RIP learns about routes that
it may not otherwise have been able to reach.
router ID An identifier in IPv4 address format for an OSPF router.
routing mode The default, Layer 3 operating mode of the module where the VLANs are
associated with zones, and firewall, NAT, routing, and VPN capabilities are
available.
RP Rendezvous Point. The point to which IGMP group members send multicast
traffic. Each IGMP group has one RP.
RPC Remote Procedure Call. A procedure where arguments or parameters are sent
to a program on a remote system. The remote program executes and returns
the results. For more information, see RFC 1831 at http://www.ietf.org/rfc/
rfc1831.txt.
RSA Rivest-Shamir-Adleman. A public-key encryption technology that was devel-
oped by RSA Data Security, Inc. The RSA algorithm is based on the fact that
there is no efficient way to factor very large numbers. Deducing an RSA key,
therefore, requires an extraordinary amount of computer processing power
and time. RSA supports keys between 1024 and 2048 bits long. RSA keys can
be used for signing digital certificates. For more information, see the RSA
Cryptography Standard at http://www.rsa.com/rsalabs/node.asp?id=2125.
running-config The settings that the TMS zl Module is using at any given moment. These
settings may or may not be saved to the startup-config.
S
SA Security Association. Secure communication between two network devices
that is created from shared security information. A SA is used in IKE. For more
information, see RFC 4306 at http://www.ietf.org/rfc/rfc4603.txt.
SA lifetime The time in seconds that can pass or amount of data in kilobytes that can be
sent before the SA must be renegotiated.