826
Glossary
DNS server
A repository of addressing information for specific Internet hosts. Name servers use the Domain
Name System (DNS) to map IP addresses to Internet hosts.
DNS spoofing
The act of breaching the trust relationship by assuming the Domain Name System (DNS) name of
another system. This is usually accomplished by either corrupting the name service cache of a victim
system or by compromising a Domain Name Server for a valid domain.
domain
A group of computers or devices that share a common directory database and are administered as a
unit. On the Internet, domains organize network addresses into hierarchical subsets. For example,
the .com domain identifies host systems that are used for commercial business.
domain entity
A group of computers sharing the network portion of their host names, for example symantec.com.
Domain entities are registered within the Internet community. Registered domain entities end with
an extension such as .com, .edu, or .gov or a country code such as .jp (Japan).
download
To transfer data from one computer to another, usually over a modem or network. Usually refers to
the act of transferring a file from the Internet, a bulletin board system (BBS), or an online service to
one’s own computer. See also upload.
download folder
The folder in which files received during file transfer are stored.
drop-down list box
A closed version of a list box with an arrow that opens the list from where the user makes a selection.
dual-homed gateway
A system that has two or more network interfaces, each of which is connected to a different network.
In firewall configurations, a dual-homed gateway usually acts to block or filter some or all of the
traffic trying to pass between the networks.
editable text field
A text field in which a user can type text or edit a single line of text.
email client
An application from which users can create, send, and read email messages.
email server
An application that controls the distribution and storage of email messages.
Extended MAPI (Messaging Application
Programming Interface)
An interface developed by Microsoft that provides messaging functions including addressing,
sending, receiving, and storing messages.
enabled
A status that indicates that a program, job, policy, or scan is available. For example, if scheduled
scans are enabled, any scheduled scan will execute when the date and time specified for the scan is
reached.
encryption
A method of scrambling or encoding data to prevent unauthorized users from reading or tampering
with the data. Only those who have access to a password or key can decrypt and use the data. The
data can include messages, files, folders, or disks.
end-to-end encryption
The process of using encryption at the point of origin in a network, followed by decryption at the
destination.
ESP (Encapsulated Security Payload)
A standard that provides confidentiality for IP datagrams or packets by encrypting the payload data
to be protected. Datagrams and packets are the message units that the Internet Protocol deals with
and that the Internet transports.
Ethernet
A local area network (LAN) protocol developed by Xerox Corporation in cooperation with DEC and
Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 100 Mbps.
event
A message that is generated by a product to indicate that something has happened.
event class
A predefined event category that is used for sorting reports and configuring alerts.
Event Collector
An application that collects events from security products, processes them, and places them in the
SESA DataStore.
Event Exclusion Rule
A rule that specifies which events should not be inserted into the SESA DataStore. Event Exclusion
Rules can be assigned to all SESA Managers by using the default configuration or to specific SESA
Managers by creating customized configurations and assigning those configurations directly to
specific SESA Managers or to a group of SESA Managers.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...