![Motorola Netopia 7000 Administrator'S Handbook Download Page 336](http://html.mh-extra.com/html/motorola/netopia-7000/netopia-7000_administrators-handbook_243781336.webp)
Administrator’s Handbook
336
-----I-----
IGMP.
I
nternet
G
roup
M
anagement
P
rotocol allows a router to determine which host groups have members
on a given network segment.
IKE. I
nternet
K
ey
E
xchange protocol provides automated key management and is a preferred alternative to
manual key management as it provides better security. Manual key management is practical in a small,
static environment of two or three sites. Exchanging the key is done through manual means. Because IKE
provides automated key exchange, it is good for larger, more dynamic environments.
INSPECTION.
The best option for Internet communications security is to have an SMLI firewall constantly
inspecting the flow of traffic: determining direction, limiting or eliminating inbound access, and verifying
down to the packet level that the network traffic is only what the customer chooses. The Netopia Gateway
works like a network super traffic cop, inspecting and filtering out undesired traffic based on your security
policy and resulting configuration.
interface.
A connection between two devices or networks.
internet address.
IP address. A 32-bit address used to route packets on a TCP/IP network. In dotted deci-
mal notation, each eight bits of the 32-bit number are presented as a decimal number, with the four octets
separated by periods.
IPCP.
Internet Protocol Control Protocol. A network control protocol in PPP specifying how IP communica-
tions will be configured and operated over a PPP link.
IPSEC.
A protocol suite defined by the Internet Engineering Task Force to protect IP traffic at packet level. It
can be used for protecting the data transmitted by any ser vice or application that is based on IP, but is com-
monly used for VPNs.
ISAKMP. I
nternet
S
ecurity
A
ssociation and
K
ey
M
anagement
P
rotocol is a framework for creating connec-
tion specific parameters. It is a protocol for establishing, negotiating, modifying, and deleting SAs and pro-
vides a framework for authentication and key exchange. ISAKMP is a par t of the IKE protocol.
-----K-----
Key Management .
The Key Management algorithm manages the exchange of security keys in the IPSec
protocol architecture. SafeHarbour suppor ts the standard
Internet Key Exchange (IKE)
-----L-----
LCP.
Link Control Protocol. Protocol responsible for negotiating connection configuration parameters,
authenticating peers on the link, determining whether a link is functioning properly, and terminating the link.
Documented in RFC 1331.
loopback test.
Diagnostic procedure in which data is sent from a devices's output channel and directed
back to its input channel so that what was sent can be compared to what was received.
Summary of Contents for Netopia 7000
Page 18: ...Administrator s Handbook 18 ...
Page 115: ...115 The screen expands to display the VLAN settings ...
Page 123: ...123 The Home page for a VoIP enabled Gateway with both phone lines registered is shown below ...
Page 192: ...Administrator s Handbook 192 ...
Page 222: ...Administrator s Handbook 222 ...
Page 342: ...Administrator s Handbook 342 ...
Page 366: ...Administrator s Handbook 366 Z Zero Touch 301 ...
Page 368: ...Administrator s Handbook 368 ...