G L O S S A R Y
B
B-2
User Guide
thentication. ESP is defined as protocol 50.
Ethernet: A local area network (LAN) technology developed by Xerox Corporation along with DEC
and Intel in the 1970s. Ethernet is a best-effort technology that uses Carrier Sense Multiple
Access/ Collision Detection (CSMA/CD) technology. Ethernet is flexible and can run over a variety
of cables including coaxial, thin coaxial, twisted pair and fiber optic. Ethernet defines the standard
for which computers connect in a LAN segment.
Extended Authentication (XAUTH): A method to perform user authentication in a separate
phase after the IKE authentication or phase 1 exchange. The authentication name must match
the XAUTH configuration name in order to allow the user to authentication and permit access.
Firewall: A hardware device or software application (or a combination of both) that provides a
system that protects a network segment from unauthorized use, usually from Internet “hackers.”
Most firewalls are installed to protect users from unauthorized Internet access, but can be
deployed to create additional network security.
File Transfer Protocol (FTP): A protocol used to transfer data over a network or the Internet.
FTP is commonly used to download or upload files from or to a server.
Gateway: A special-purpose device often referred to as a router that transfers IP datagrams from
one network to another until they reach their final destination.
High Availability (HA): Provides the ability to service end users (i.e., sessions) with little or no
interruption when failures occur.
Host Name: A unique name that a host on a network is known as and is used to identify the host
during data transfers.
Hyper Text Transfer Protocol (HTTP): The protocol that the World Wide Web uses. HTTP
defines how messages are formatted and transmitted, and what actions Web servers and
browsers should take in response to various commands.
Hub: A common connection point for multiple devices on a local area network (LAN) segment. As
traffic is sent to a hub port, the hub port forwards it to all other ports on the hub so all other
network devices can view that traffic.
Internet Control Message Protocol (ICMP): An extension of IP used to report packet errors
and control or transmit information. Ping is an example of an ICMP message that is used to test
connectivity of a device.
Internet: A network that allows millions of computers to be connected as a single global network.
Originally developed by the U. S. Defense Department, the Internet was designed as a way to
prevent communication breakdown in the event of nuclear war. Today the Internet is used as a
way to share information including e-mail, files, and newsgroups.
Internet Key Exchange (IKE): A method used to exchange keys to encrypt and authenticate
data over an unsecured medium, such as the Internet.
Internet Protocol (IP): Protocol that specifies the format for a packet, also called a datagram.
Datagrams are commonly used in connectionless, best-effort delivery systems like the Internet.
IP defines how information is passed between systems across a network.
IP Address: A32-bit numeric address with four spaces, usually separated by a period, that
identifies a node or network device. An IP address can be a combination of four numbers from 0
through 255. For example, 172.16.31.2 represents an IP address.
IP Security (IPsec): A set of protocols developed by the Internet Engineering Task Force (IETF)
to enable secure exchange at the IP level. The most common implementation of IPsec is seen in
virtual private network (VPN) deployments. IPsec enables VPNs to take advantage of authentica-
tion, integrity, and confidentiality.
Internet Security Association and Key Management Protocol (ISAKMP): Protocol that
uses a common framework to provide information about Security Association (SA) attributes.
These include the negotiation, modification, and deletion of SA.
Local Area Network (LAN): Any network technology that connects multiple machines in a local
office or building. LAN networks usually consist of a main connection point like a switch or hub
and enable all machines on that segment to communicate. LAN networks have a limited range of
around 1,640 feet or 500 meters.
Man in the Middle Attack (MTM): Incident allowing a “hacker” to read, insert, and modify all
messages between two parties without the parties knowing their link was compromised. The
Содержание freeGuard Slim 100
Страница 10: ...FSL100 User Guide x ...
Страница 24: ...G E T T I N G ST A R T E D 1 1 14 User Guide ...
Страница 42: ...SY S T E M M A NA G E M E N T 2 2 18 User Guide ...
Страница 50: ...M A N A G I N G T R A F F IC F L O W 3 3 8 User Guide ...
Страница 58: ...C O N F IG U R I N G A TT A C K PRE VE N T I O N 4 4 8 User Guide ...
Страница 84: ...T R A F F I C F LO W R E P O R T I N G 5 5 26 User Guide ...
Страница 122: ...M O N I T O R I N G T R A FF I C 7 7 16 User Guide ...
Страница 134: ...U SI N G S N M P 8 8 12 User Guide ...
Страница 166: ...A L PH AB E T I C LI S T I NG OF LO G M E SS AG E S C C 4 User Guide ...
Страница 170: ...N O TI F I C A T I O N A N D S A F E T Y ST A TE M E N T S Battery Statement D D 4 User Guide ...