A
CCESS
G
ATEWAY
378
Subnet Address
The subnet portion of an IP address that is dedicated to the subnet. In a subnetted network, the host portion of an IP
address is split into a subnet portion and a host portion using an address (subnet) mask. See also,
IP Address
and
Subnet
.
Subnet Mask
See
Subnet Address
.
Subscriber
Any person or organization that pays a period fee for services.
SYSLOG
(SYStem LOGging) Syslog is the standard event logging subsystem for Unix and consists of a server daemon, a client
function library, and a client command line utility. You can log to files, terminal devices, logged on users, or even
forward to other syslog systems. See also,
Daemon
.
TCP
(Transmission Control Protocol) Manages data into small packets and ensures that the data is transmitted correctly over
a network. If an error is detected, the data is transmitted again in its original form. See also,
TCP/IP
.
TCP/IP
(Transmission Control Protocol/Internet Protocol). A suite of protocols that regulates data communications for the
Internet. See also,
Internet Protocol
,
Protocol
, and
TCP
.
Telnet
A software program and command utility used to connect between remote locations and services. Telnet connects you
to the login prompt of another host (that you have access rights to). See also,
Host
.
Throughput
The net data transfer rate between an information source and its destination, using the maximum packet size without
loss. Throughput is expressed as Megabits per second (Mbps), defined by RFC1242, Section 3.17. See also,
Forwarding Rate
,
Mbps
,
Packet
,
Packet Switching Network
,
pps
, and
RFC
.
TLS
(Transport Layer Security) A protocol that guarantees privacy and data integrity between client/server applications
communicating over the Internet. The TLS protocol is made up of two layers:
TLS Record Protocol
Layered on top of a reliable transport protocol, such as
TCP
, it ensures that the connection is private by using
symmetric data encryption and ensures that the connection is reliable. The TLS Record Protocol also is used for
encapsulation of higher-level protocols, such as the TLS Handshake Protocol.
TLS Handshake Protocol
Allows authentication between the server and client and the negotiation of an encryption algorithm and cryptographic
keys before the application protocol transmits or receives any data.
TLS is application protocol-independent. Higher-level protocols can layer on top of the TLS protocol transparently.
Based on Netscape’s SSL 3.0, TLS supersedes and is an extension of SSL. TLS and SSL are not interoperable. See
also,
Protocol
and
SSL
.
Translation
See
IP Address Translation
.
Summary of Contents for Access Gateway
Page 1: ......
Page 12: ...ACCESS GATEWAY xii ...
Page 51: ...ACCESS GATEWAY Introduction 39 ...
Page 84: ...ACCESS GATEWAY 72 Installing the Access Gateway ...
Page 90: ...ACCESS GATEWAY 78 Installing the Access Gateway ...
Page 95: ...ACCESS GATEWAY System Administration 83 ...
Page 96: ...ACCESS GATEWAY 84 System Administration ...
Page 146: ...ACCESS GATEWAY 134 System Administration ...
Page 161: ...ACCESS GATEWAY System Administration 149 ...
Page 185: ...ACCESS GATEWAY System Administration 173 ...
Page 205: ...ACCESS GATEWAY System Administration 193 The Network Interfaces screen appears ...
Page 310: ...ACCESS GATEWAY 298 The Subscriber Interface ...
Page 376: ...This page intentionally left blank ACCESS GATEWAY 364 Troubleshooting ...
Page 378: ...This page intentionally left blank ACCESS GATEWAY 366 ...