services and devices worldwide. By providing a worldwide, distributed
keyword-based redirection service, the Domain Name System is an
essential component of the functionality of the Internet.
Encapsulating Security
Payload
is a member of the
protocol suite. In IPsec it provides origin
authenticity, integrity, and confidentiality protection of packets.
Fully Qualified Domain
Name
is a domain name that specifies its exact location in the tree hierarchy
of the
. It specifies all domain levels, including the
top-level domain and the root zone. A fully qualified domain name is
distinguished by its lack of ambiguity: it can be interpreted only in one
way.
Generic Routing
Encapsulation
is a tunneling protocol developed by Cisco Systems that can encapsulate
a wide variety of network layer protocols inside virtual point-to-point
links over an Internet Protocol network.
Hash Message
Authentication Code
is a specific construction for calculating a message authentication code
(MAC) involving a cryptographic hash function in combination with a
secret cryptographic key. As with any MAC, it may be used to
simultaneously verify both the data integrity and the authentication
of a message. Any cryptographic hash function, such as MD5 or SHA-1,
may be used in the calculation of an HMAC; the resulting MAC algorithm
is termed HMAC-MD5 or HMAC-SHA1 accordingly. The cryptographic
strength of the HMAC depends upon the cryptographic strength of the
underlying hash function, the size of its hash output, and on the size
and quality of the key.
Idempotence
is the property of certain operations in computer science, that they
can be applied multiple times without changing the result beyond the
initial application.
Internet Control Message
Protocol
is a message control and error-reporting protocol between a host
server and a gateway to the Internet. ICMP uses Internet Protocol (IP)
datagrams, but the messages are processed by the IP software and
are not directly apparent to the application user.
Internet Group
Management Protocol
is an Internet protocol that provides a way for an Internet computer
to report its multicast group membership to adjacent routers.
Multicasting allows one computer on the Internet to send content to
multiple other computers. Multicasting can be used for streaming
media to an audience that has "tuned in" by setting up a multicast
group membership.
Internet Key Exchange
is a standard protocol IPsec, used to ensure the safety of interaction
in virtual private networks. IKE purpose is to establish a secure
authenticated communication channel by using the
key
exchange algorithm to generate a shared secret key to encrypt further
communications.
Internet Protocol
is the principal communications protocol in the Internet. The first major
version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol
of the Internet. Its successor is Internet Protocol Version 6 (IPv6).
Keenetic Extra (KN-1710) — Command Reference Guide
325
Glossary
Summary of Contents for EXTRA KN-1710
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Extra KN 1710 6 Contents Overview...
Page 20: ...Command Reference Guide Keenetic Extra KN 1710 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Extra KN 1710 26 Chapter 2 Introduction to the CLI...
Page 322: ...Command Reference Guide Keenetic Extra KN 1710 322 Chapter 3 Command Reference...
Page 332: ...Command Reference Guide Keenetic Extra KN 1710 332 Glossary...
Page 348: ...Command Reference Guide Keenetic Extra KN 1710 348 Appendix C SNMP MIB...