Glossary and Acronyms
end and server-to-server.
RADIUS
Remote Authentication Dial-In User
Service (RADIUS) is a networking protocol that
provides centralized Authentication, Authoriza-
tion, and Accounting (AAA or Triple A) manage-
ment for users who connect and use a network
service. Because of the broad support and the
ubiquitous nature of the RADIUS protocol, it is
often used by ISPs and enterprises to manage
access to the Internet or internal networks, wire-
less networks, and integrated e-mail services.
Root certificate
In cryptography and com-
puter security, a root certificate is either an un-
signed public key certificate or a self-signed cer-
tificate that identifies the Root Certificate Author-
ity (CA). A root certificate is part of a public key
infrastructure scheme. The most common com-
mercial variety is based on the ITU-T X.509 stan-
dard, which normally includes a digital signature
from a certificate authority (CA).
Digital certificates are verified using a chain of
trust. The trust anchor for the digital certificate is
the Root Certificate Authority (CA). See
Router
A router is a device that forwards data
packets between computer networks, creating an
overlay internetwork. A router is connected to two
or more data lines from different networks. When
a data packet comes in one of the lines, the router
reads the address information in the packet to de-
termine its ultimate destination. Then, using infor-
mation in its routing table or routing policy, it di-
rects the packet to the next network on its jour-
ney. Routers perform the
traffic directing
func-
tions on the Internet. A data packet is typically
forwarded from one router to another through the
networks that constitute the internetwork until it
reaches its destination node.
SFTP
Secure File Transfer Protocol (SFTP) is
a secure version of File Transfer Protocol (FTP),
which facilitates data access and data transfer
over a Secure Shell (SSH) data stream. It is part
of the
Protocol. This term is also known as
SSH File Transfer Protocol.
SMTP
The SMTP (Simple Mail Transfer Proto-
col) is a standard e-mail protocol on the Internet
and part of the TCP/IP protocol suite, as defined
by IETF RFC 2821. SMTP defines the message
format and the message transfer agent (MTA),
which stores and forwards the mail. SMTP by de-
fault uses TCP port 25. The protocol for mail sub-
mission is the same, but uses port 587. SMTP
connections secured by SSL, known as
default to port 465.
SMTPS
SMTPS (Simple Mail Transfer Protocol
Secure) refers to a method for securing SMTP
with transport layer security. For more informa-
tion about SMTP, see description of the
SNMP
The Simple Network Management Pro-
tocol (SNMP) is an
Internet-standard protocol
for managing devices on IP networks
. Devices
that typically support SNMP include routers,
switches, servers, workstations, printers, mo-
dem racks, and more. It is used mostly in net-
work management systems to monitor network-
attached devices for conditions that warrant ad-
ministrative attention. SNMP is a component of
the Internet Protocol Suite as defined by the In-
ternet Engineering Task Force (IETF). It consists
of a set of standards for network management, in-
cluding an application layer protocol, a database
schema, and a set of data objects.
SSH
Secure Shell (SSH), sometimes known as
Secure Socket Shell, is a UNIX-based command
interface and protocol for securely getting ac-
cess to a remote computer. It is widely used by
network administrators to control Web and other
kinds of servers remotely. SSH is actually a suite
of three utilities – slogin, ssh, and scp – that
are secure versions of the earlier UNIX utilities,
rlogin, rsh, and rcp. SSH commands are en-
crypted and secure in several ways. Both ends
of the client/server connection are authenticated
using a digital certificate, and passwords are pro-
tected by being encrypted.
TCP
The Transmission Control Protocol (TCP)
is one of the core protocols of the Internet proto-
col suite (IP), and is so common that the entire
suite is often called TCP/IP. TCP provides reli-
able, ordered, error-checked delivery of a stream
of octets between programs running on comput-
ers connected to a local area network, intranet
or the public Internet. It resides at the transport
layer.
Web browsers use TCP when they connect to
servers on the World Wide Web, and it is used
to deliver email and transfer files from one loca-
tion to another.
UDP
The User Datagram Protocol (UDP) is one
146
UM Configuration OWL LTE M12
Rel. 06.1.09 - 07/2019
Summary of Contents for Hirschmann OWL LTE M12
Page 153: ......