
A
CCESS
G
ATEWAY
310
Subnet Address
The subnet portion of an IP address that is dedicated to the subnet. In a subnetted network, the host portion of an IP
address is split into a subnet portion and a host portion using an address (subnet) mask. See also,
IP Address
and
Subnet
.
Subnet Mask
See
Subnet Address
.
Subscriber
Any person or organization that pays a period fee for services.
SYSLOG
(SYStem LOGging) Syslog is the standard event logging subsystem for Unix and consists of a server daemon, a client
function library, and a client command line utility. You can log to files, terminal devices, logged on users, or even
forward to other syslog systems. See also,
Daemon
.
TCP
(Transmission Control Protocol) Manages data into small packets and ensures that the data is transmitted correctly over
a network. If an error is detected, the data is transmitted again in its original form. See also,
TCP/IP
.
TCP/IP
(Transmission Control Protocol/Internet Protocol). A suite of protocols that regulates data communications for the
Internet. See also,
Internet Protocol
,
Protocol
, and
TCP
.
Telnet
A software program and command utility used to connect between remote locations and services. Telnet connects you
to the login prompt of another host (that you have access rights to). See also,
Host
.
Throughput
The net data transfer rate between an information source and its destination, using the maximum packet size without
loss. Throughput is expressed as Megabits per second (Mbps), defined by RFC1242, Section 3.17. See also,
Forwarding Rate
,
Mbps
,
Packet
,
Packet Switching Network
,
pps
, and
RFC
.
TLS
(Transport Layer Security) A protocol that guarantees privacy and data integrity between client/server applications
communicating over the Internet. The TLS protocol is made up of two layers:
TLS Record Protocol
Layered on top of a reliable transport protocol, such as
TCP
, it ensures that the connection is private by using
symmetric data encryption and ensures that the connection is reliable. The TLS Record Protocol also is used for
encapsulation of higher-level protocols, such as the TLS Handshake Protocol.
TLS Handshake Protocol
Allows authentication between the server and client and the negotiation of an encryption algorithm and cryptographic
keys before the application protocol transmits or receives any data.
TLS is application protocol-independent. Higher-level protocols can layer on top of the TLS protocol transparently.
Based on Netscape’s SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable. See
also,
Protocol
and
SSL
.
Translation
See
IP Address Translation
.
Summary of Contents for Access Gateways
Page 1: ......
Page 5: ...ACCESS GATEWAY...
Page 6: ...This page intentionally left blank ACCESS GATEWAY...
Page 36: ...ACCESS GATEWAY 24 Introduction...
Page 62: ...ACCESS GATEWAY 50 Installing the Access Gateway...
Page 136: ...ACCESS GATEWAY 124 System Administration...
Page 156: ...ACCESS GATEWAY 144 System Administration The Network Interfaces screen appears...
Page 250: ...ACCESS GATEWAY 238 The Subscriber Interface...
Page 302: ...ACCESS GATEWAY 290 Quick Reference Guide...
Page 308: ...This page intentionally left blank ACCESS GATEWAY 296 Troubleshooting...
Page 310: ...This page intentionally left blank ACCESS GATEWAY 298...
Page 330: ...ACCESS GATEWAY 318...