A
acceptable use policy.

Defines what the company will and will not tolerate regarding internal and external access, use of software and hardware, and any additional constraints required by federal, state, or local laws, regulations, or ordinances.

Adaptive Security Algorithm (ASA).

Examines all traffic flowing into and out of PIX Firewalls and maintains a database of session state information for each connection. Any packet that does not match its recorded entry in the ASA's session state database is rejected immediately. Additionally, ASA defines levels of security for ports and only permits traffic to flow from a higher-security port to a lower-security port unless a specific rule has been defined permitting otherwise.

antireplay.

A security ...

Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.