X
ES520 Bridge: Glossary
DHCP
Dynamic Host Configuration Protocol—an Internet protocol describing a method for
flexibly assigning device IP addresses from a defined pool of available addresses as
each networked device comes online, through a client-server architecture. DHCP is an
alternative to a network of fixed IP addresses.
Diffie-Hellman key establishment
A protocol by which two parties with no prior knowledge of one another can agree upon
a shared secret key for symmetric key encryption of data over an insecure channel.
Also,
Diffie-Hellman-Merkle key establishment
;
exponential key exchange
.
DLC
Data Link Control—the second lowest network layer in the OSI Model, also referred to
as the
Data Link Layer
,
OSI Layer 2
or simply
Layer 2
. The DLC layer contains two sub-
layers: the MAC and LLC layers.
DMZ
Demilitarized Zone—in IT, a computer (or subnet) located between the private LAN and
a public network, usually the Internet.
DNS
Domain Name System
,
Server
or
Service
—a system or network service, defined in the
TCP/IP Internet Protocol Suite, that translates between textual domain and host names
and numerical IP addresses.
DoD
Department of Defense—the United States military.
EAP
Extensible Authentication Protocol—defined by RFC 2284, a general protocol for user
authentication. EAP is implemented by a number of authentication services, including
RADIUS.
EAP-MD5
An EAP security algorithm developed by RSA Security® that uses a 128-bit generated
number string to verify the authenticity of data transfers.
EAP-TLS
EAP-Transport Layer Security—a Point-to-Point Protocol (PPP) extension supporting
mutual authentication, integrity-protected cipher suite negotiation, and key exchange
between two endpoints, within PPP.
EAP-TTLS
EAP-Tunneled TLS—An EAP-TLS protocol developed by Funk and Certicom that uses
TLS to establish a secure connection between a client and server.
ES300
The Fortress hardware model identifier of the
Secure Bridge
.
ES520
The Fortress hardware model identifier of the
Secure Wireless Bridge
.
failover
A device or system configuration in which two, identical components are installed for a
given function so that if one of them fails the redundant component can carry on oper-
ations without substantial service interruption. Also, an instance in which an active
component becomes inoperative and
fails over
operations to its partner.
FC-
X
The Fortress hardware model identifier of the
Fortress Controller
.
FIPS
Federal Information Processing Standards—issued by NIST, FIPS mandate how IT,
including network security, is implemented by the U.S. government and associated
agencies.
FIPS operating mode
In Fortress Technologies products, the operating mode that complies with FIPS 140-2
Security Level 2.
Fortress Controller
Sometimes,
Fortress Security Controller
—Fortress’s FC-
X
model network device for
securing communications between wireless devices and a LAN, or between devices
within a LAN, or in a networked configuration.
Fortress controller device
A collective noun for Fortress network devices (Fortress Bridges and Controllers).
Fortress Secure Client
A software client module for securing network communications on devices such as lap-
tops, PDAs, tablet PCs, and industrial equipment such as barcode scanners and porta-
ble terminals.
Fortress Secure Client Bridge
Also,
Fortress
SCB
or
SCB
—a hardware device for providing wireless connectivity and
securing network communications on wired devices such as portable medical equip-
ment and point-of-sale (POS) terminals.