378
| Glossary
P
OLICY
ROUTING
—
Routing scheme that forwards packets to specific interfaces based on
user-configured policies. Such policies might specify that traffic sent from a particular net-
work should be routed through interface, while all other traffic should be routed through
another interface.
P
OLICY
R
ULES
—
In a policy enforced network (PEN), policy rules determine how the mem-
bers and endpoint groups of a policy group communicate.
PPTP (P
OINT
-
TO
-P
OINT
T
UNNELING
P
ROTOCOL
) —
Point-to-Point Tunneling Protocol (PPTP)
is a network protocol that enables the secure transfer of data from a remote client to a pri-
vate enterprise server by creating a virtual private network (VPN) across TCP/IP-based data
networks. PPTP supports on-demand, multi-protocol, virtual private networking over public
networks, such as the Internet.
P
RIVATE
K
EY
—
In cryptography, a private or secret key is an encryption/decryption key
known only to the party or parties that exchange secret messages. In traditional secret key
cryptography, a key would be shared by the communicators so that each could encrypt and
decrypt messages. The risk in this system is that if either party loses the key or it is stolen,
the system is broken. A more recent alternative is to use a combination of public and private
keys. In this system, a public key is used together with a private key.
P
ROFILE
—
A profile is an abstract collection of configuration data that is utilized as a tem-
plate to specify configuration parameters to be applied to a device as a result of a policy con-
dition being true.
P
UBLIC
K
EY
—
A public key is a value provided by some designated authority as a key that,
combined with a private key derived from the public key, can be used to effectively encrypt
and decrypt messages and digital signatures. The use of combined public and private keys is
known as asymmetric encryption. A system for using public keys is called a public key infra-
structure (PKI).
Q
O
S —
Quality of Service. In digital circuits, it is a measure of specific error conditions as
compared with a standard. The establishment of QoS levels means that transmission rates,
error rates, and other characteristics can be measured, improved, and, to some extent, guar-
anteed in advance. Often related to Class of Service (CoS).
RADIUS —
RADIUS (Remote Authentication Dial-In User Service) is a client/server proto-
col and software that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or service.
RADIUS allows a company to maintain user profiles in a central database that all remote
servers can share.
RIP —
Routing Information Protocol
S
ELF
-
SIGNED
C
ERTIFICATE
A self-signed certificate uses its own certificate request as a signature rather than the signa-
ture of a CA. A self-signed certificate will not provide the same functionality as a CA-signed
certificate. A self-signed certificate will not be automatically recognized by users' browsers,
Summary of Contents for OpenManage Network Manager
Page 1: ...Dell OpenManage Network Manager version 5 1 Web Client Guide ...
Page 14: ...14 A Note About Performance Preface ...
Page 98: ...98 Schedules Portal Conventions ...
Page 142: ...142 Vendors Key Portlets ...
Page 232: ...232 File Management File Servers ...
Page 242: ...242 Deploy Configuration ...
Page 290: ...290 Key Metric Editor Monitoring Metrics This panel s display depends on the selected device ...
Page 340: ...340 ...
Page 374: ...374 Adaptive CLI Records Archiving Policy Actions and Adaptive CLI ...
Page 380: ...380 Glossary ...
Page 388: ...388 388 Index ...