Glossary
GL-17
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
RPC
Remote Procedure Call. RPCs are procedure calls that are built or specified by clients and executed 
on servers, with the results returned over the network to the clients.
RSA
A public key cryptographic algorithm (named after its inventors, Rivest, Shamir, and Adelman) with 
a variable key length. The main weakness of RSA is that it is significantly slow to compute compared 
to popular secret-key algorithms, such as DES. The Cisco implementation of IKE uses a 
Diffie-Hellman exchange to get the secret keys. This exchange can be authenticated with RSA (or 
preshared keys). With the Diffie-Hellman exchange, the DES key never crosses the network (not even 
in encrypted form), which is not the case with the RSA encrypt and sign technique. RSA is not public 
domain, and must be licensed from RSA Data Security.
RSH
Remote Shell. A protocol that allows a user to execute commands on a remote system without having 
to log in to the system. For example, RSH can be used to remotely examine the status of a number of 
access servers without connecting to each communication server, executing the command, and then 
disconnecting from the communication server.
RTCP
RTP Control Protocol. Protocol that monitors the QoS of an IPv6 RTP connection and conveys 
information about the ongoing session. See also RTP.
RTP
Real-Time Transport Protocol. Commonly used with IP networks. RTP is designed to provide 
end-to-end network transport functions for applications transmitting real-time data, such as audio, 
video, or simulation data, over multicast or unicast network services. RTP provides such services as 
payload type identification, sequence numbering, timestamping, and delivery monitoring to real-time 
applications.
RTSP
Real Time Streaming Protocol. Enables the controlled delivery of real-time data, such as audio and 
video. RTSP is designed to work with established protocols, such as RTP and HTTP.
rule
Conditional statements added to the adaptive security appliance configuration to define security 
policy for a particular situation. See also ACE, ACL, NAT.
running 
configuration
The configuration currently running in RAM on the adaptive security appliance. The configuration 
that determines the operational characteristics of the adaptive security appliance.
S
SA
security association. An instance of security policy and keying material applied to a data flow. SAs 
are established in pairs by IPsec peers during both phases of IPsec. SAs specify the encryption 
algorithms and other security parameters used to create a secure tunnel. Phase 1 SAs (IKE SAs) 
establish a secure tunnel for negotiating Phase 2 SAs. Phase 2 SAs (IPsec SAs) establish the secure 
tunnel used for sending user data. Both IKE and IPsec use SAs, although SAs are independent of one 
another. IPsec SAs are unidirectional and they are unique in each security protocol. A set of SAs are 
needed for a protected data pipe, one per direction per protocol. For example, if you have a pipe that 
supports ESP between peers, one ESP SA is required for each direction. SAs are uniquely identified 
by destination (IPsec endpoint) address, security protocol (AH or ESP), and Security Parameter Index. 
IKE negotiates and establishes SAs on behalf of IPsec. A user can also establish IPsec SAs manually. 
An IKE SA is used by IKE only, and unlike the IPsec SA, it is bidirectional.
SCCP
Skinny Client Control Protocol. A Cisco-proprietary protocol used between Cisco Call Manager and 
Cisco Vo I P  phones.