Access control entry
An individual rule in an ACL
Access control list
A group of rules that permit or deny passage of packets through a router based on parameters such as source and destination IP address, port address, protocol time to live, IP options, and TCP flags
Address resolution protocol (ARP)
A networking protocol that resolves IP addresses to MAC addresses
Antispoofing
Measures to address digital attacks in which false source and destination addresses are used to bypass a routers packet filters
ARP tabel
A network system tool that lists the MAC and IP address resolutions of other devices on the network, making the resolution process more efficient
Authentication, authorization, and accounting logging (AAA)
The process of verifying users identities, establishing their level of access, and recording their activity with the use of a RADIUS or TACACS+ server
Auxiliary port
The port on a Cisco device that permits dial-in access to the device
Banner
A message, usually a warning about appropriate use, presented to users of a digital system before authentication
Buffered logging
The process of outputting logged data to a cisco routers RAN
Cisco internet work operating system (IOS)
The operating system used on Cisco devices such as routers,switches, and firewalls
Console port
The port on a Cisco device that permits direct physical access from a nearby computer using the serial RS-232 protocol
Convergence
A state in which all routers on a network have up-to-date routing tables
Default routes
Manual entries in a routers routing table that specify how to handle packets that are not routable
Distance-vector routing protocol
A protocol that uses simple distance measurements such as hops to determine the best route for a packet
Dynamic routes
Entries in a routers routing table that are generated automatically by communication through protocols with other routers on the network
Inverse mask
The number in an access control list that specifies which part of an IP address is considered significant
Link-state routing protocol
A routing protocol that uses complex calculations to determine the best route for a packet
Logging
The process of recording activity on a computing device
Metrics
Cost values that help routers assess the desirability of a link
Named ACLs
An advancement over extended and standard ACLs that allow filtering packets based on IP options and TCP flags, and that permit insertion and modification of ACE's
Remote authentication dial-in user service (RADIUS)
An authentication, authorization, and accounting service protocol
Rollover cable
A cable used to connect to a Cisco CON port from a computer's COM port via the serial RS-232 protocol
Route summerizarion
The process of shortening the network identifier in a subnet mask to allow one network route to represent multiple network routes. (Supernetting)
Routed protocol
A networking protocol used to transport data packets
Routing
The process of transporting packets of information across a network from the source node to the destination node
Routing protocol
A protocol used by routers to share their routing tables with each other
Routing table
The information about accessible networks that is maintained by a router
Secure Shell (SSH)
A protocol used to secure remote sessions by using asymmetric encryption
Simple network management protocol (SNMP)
A protocol used to monitor the status of network devices
SNMP trap logging
A specific parameter of network activity to monitor
Standard ACLs
Access control lists that are limited in filtering parameters to a source IP address or network
Static routes
Manual entries in a routers routing table by an administrator
Stub network
A network segment on a larger network edge; a dead-end segment
Stub router
A router that connects a stub network to the larger network
Super netting
Another term for route summarization
Syslog server
A log management service
Terminal access controller access control system plus (TACACS+)
An authentication, authorization, and accounting service protocol
Variable length subnet masking (VLSM)
The process of adjusting the subnet mask within a single network to allocate IP addresses more efficiently
Virtual terminal
Virtual session access points for simultaneous access to a Cisco device