828
Glossary
firewall
A program that protects the resources of one network from users from other networks. Typically, an
enterprise with an intranet that allows its workers access to the wider Internet will want a firewall to
prevent outsiders from accessing its own private data resources.
flatten utility
A utility that converts a binary log file into a more usable format for a third-party utility, such as an
ASCII text editor. This utility is also used to review the most recent messages, or directed to show just
statistics messages.
flooding program
A program that contains code that, when executed, will bombard the selected system with requests in
an effort to slow down or shut down the system.
follow-up
The final phase of incident response to an incident. All other phases seek the most efficient path to
this phase. Reporting is a key action in this phase.
forward filter
A filter that you configure and then apply to all incoming or outgoing traffic that arrives at any
security gateway system interface. If a packet matches the chosen filter, authentication might not be
required.
forwarding
See event forwarding.
FQDN (fully qualified domain name)
A URL that consists of a host and domain name, including top-level domain. For example,
www.symantec.com is a fully qualified domain name. www is the host, symantec is the second-level
domain, and .com is the top-level domain. An FQDN always starts with a host name and continues to
the top-level domain name, so www.sesa.symantec.com is also an FQDN.
FTP (File Transfer Protocol)
The simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer
Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail
Transfer Protocol (SMTP), which transfers email, FTP is an application protocol that uses the
Internet’s TCP/IP protocols.
gateway
A network point that acts as an entrance to another network. In a company network, a proxy server
acts as a gateway between the internal network and the Internet. A gateway can also be any computer
or service that passes packets from one network to another network during their trip across the
Internet.
generic utilities
General purpose code and devices, for example, screen grabbers and sniffers that look at data and
capture information such as passwords, keys, and secrets.
global container
A container of reports that span all products.
global security
The ability of an access control package to permit protection across a variety of mainframe
environments, providing users with a common security interface to all.
global tunnel
A VPN tunnel definition that applies to all outbound traffic from the host or gateway. For example, a
global VPN tunnel is defined at a branch office gateway to the main office. The branch office forwards
all traffic destined for the Internet into the VPN tunnel so that the main office firewall can filter the
traffic before it reaches the Internet.
GNU Zebra
Third-party software that supports route propagation.
granularity
The relative fineness or coarseness by which a mechanism can be adjusted.
group
An account in Windows NT User Manager that contains other accounts, which are called members.
Permissions and rights granted to a group are also provided to its members, making groups a
convenient way to grant common capabilities to collections of user accounts.
group box
A box that visually encloses a set of related options.
group entity
A collection of other network entities, such as hosts, domains, and subnets.
hack
A program in which a significant portion of the code was originally another program.
hack tool
A tool that is used by a hacker to gain unauthorized access to a computer. One type of hack tool is a
keystroke logger, which is a program that tracks and records individual keystrokes and can send this
information back to the hacker.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...