Chapter 1. Before You Start
Air Live IAS-2000 User’s Manual V1.0
.
11
Server
Any computer whose function in a network is to provide user access to files, printing, communications, and other
services.
SMTP
Simple Mail Transfer Protocol. The standard e-mail protocol on the Internet.
SNMP
Simple Network Management Protocol. A set of protocols for managing complex networks. The first versions of
SNMP were developed in the early 80s. SNMP works by sending messages, called protocol data units (PDUs), to
different parts of a network. SNMP-compliant devices, called agents, store data about themselves in Management
Information Bases (MIBs) and return this data to the SNMP requesters.
Software
Instructions for the computer. A series of instructions that performs a particular task is called a "program".
SOHO
Small Office/Home Office.
A term generally used to describe an office or business with ten or fewer computers
and/or employees.
SSID
Service Set Identifier. A 32-character unique identifier attached to the header of packets sent over a WLAN that acts
as a password when a mobile device tries to connect to the BSS. (Also called ESSID.) The SSID differentiates one
WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the
same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because an SSID
can be sniffed in plain text from a packet, it does not supply any security to the network. An SSID is also referred to
as a Network Name because essentially it is a name that identifies a wireless network.
SSH
Developed by SSH Communications Security Ltd., Secure Shell is a program to log into another computer over a
network, to execute commands in a remote machine, and to move files from one machine to another. It provides
strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp,
and rdist.
SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who
has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or
hijack the connection when encryption is enabled.
When using ssh's login (instead of rlogin) the entire login session, including transmission of password, is encrypted;
therefore it is almost impossible for an outsider to collect passwords.
SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication.