724-746-5500 | blackbox.com
Page 126
Appendix B: Glossary
Appendix B. Glossary
3DES
: See Triple Data Encryption Standard.
access point (AP)
: A device that provides access (connection) to a wireless network.
NOTE: Some access points also have a connection to a wired network (in addition to a connection to a wireless network).
address translation
: Conversion of an IP address to another IP address. Also see network address translation, address translation
traversal.
address translation traversal
: Any of several methods of maintaining end-to-end connectivity and security when address trans-
lation occurs between the transmission endpoints. Also see NAT traversal, Encore NAT Traversal™.
Advanced Encryption Standard (AES)
: An encryption standard, FIPS 197, that NIST proposes to replace DES. AES uses the
Rijndael symmetric block cipher, and supports 128-bit, 192-bit, and 256-bit keys.
AES
: See Advanced Encryption Standard.
aggressive mode
: A mode that can be used in phase 1 of an IPsec VPN tunnel. (Phase 1 sets up the VPN tunnel.) Aggressive
mode does not hide the identities of the parties while negotiating the security association. Aggressive mode is quicker than main
mode.
NOTE: Phase 2 (bulk data transfer) uses quick mode.
Compare main mode, transport mode. Also see tunnel mode.
AH
: See authentication header.
anti-replay
: An IPsec routine that uses authentication and sequence numbers to thwart replay attacks.
AP
: See access point.
asymmetric encryption
: (Also called public-key cryptography.) Use of a paired private key and public key for encryption and
decryption. The private key is used only by its owner. The corresponding public key is used by all other parties when encrypting or
decrypting communication with the private key’s owner.
Asymmetric encryption is used for authentication, including non-repudiation. RSA is an example of asymmetric encryption.
NOTE: Because asymmetric encryption consumes significant resources, it is not used to encrypt the bulk of a message and it is not
used for data transfer.
Compare symmetric encryption. Also see combined cryptography.
authentication
: Verification that the declared sender is the actual sender, and that the data received are the data that were sent.
authentication header (AH)
: An IPsec protocol that performs authentication. AH may be applied alone or with ESP.
block cipher
: Encryption of data into blocks of a fixed size.
CDM
: See code-division multiplexing.
CDMA
: See code-division multiple access.
CEN
: See European Committee for Standardization.
checksum
: An algorithm performed to detect accidental error in data transmission or data storage. Errors in transmission are
usually caused by a bad line.
NOTE: Checksums cannot detect corruption of data at the source.
Also see cyclic redundancy check, hash function, authentication.
CIP
: See critical infrastructure protection.
Содержание WRT4000-ANT
Страница 141: ...724 746 5500 blackbox com Page 141 NOTES...
Страница 142: ...724 746 5500 blackbox com Page 142 NOTES...
Страница 143: ...724 746 5500 blackbox com Page 143 NOTES...