. . . . .
G L O S S A R Y
User Guide
B-3
attacker must have the ability to observe and intercept all messages going between the two
victims.
Maximum Transmission Unit (MTU): The largest physical packet size, measure in bytes that
a network can transmit. Any messages larger than the MTU divide into smaller packets before
being sent.
Message Digest 5 (MD5): A one-way hash function. This hash function takes a variable length
message and formats it to a fixed length using a 16-bit key to produce 128-bit hash.
Media Access Control (MAC) Address: The hardware address that uniquely defines each
Ethernet interface in use on a local area network (LAN). The MAC address commonly refers to the
Ethernet address or a node on a LAN. When connected to the Internet, the MAC address tracks
the IP address of a node. The Freedom9 network appliance software creates a table that references
the MAC address to a known IP address.
Netmask: Identifies the sub-network and the hosts that are available. An example, 10.0.0.0
255.255.255.0 (10.0.0.0/24) refers to all hosts in the 10.0.0.0 subnet.
Network Address Translation (NAT): A standard that allows machines on a local area network
(LAN) to use a set of IP addresses for internal use and another IP address or set of addresses to
access external traffic. Most NAT devices are used to enable multiple machines on a LAN to access
the Internet using a single external address.
Network Time Protocol (NTP): Protocol built on top of TCP/IP and used to synchronize local
timekeeping with reference to radio, atomic, or other clocks located on the Internet. This protocol
is capable of providing accuracies typically within a millisecond to a network device.
Next Hop: An IP address used in a routing table to enable forwarding of traffic for a specific
network.
Packet: A unit of data routed between a source and destination over the Internet or a packet-
switched network.
Public Key Infrastructure (PKI): PKI is designed to be used with IPSec instead of PSK and
Manual Key. It provides a higher level of security.
Port Address Translation (PAT): Translates the original source port number to a different,
randomly assigned port number.
Port Mapping: Changes the original destination port number on a packet to a different, prede-
termined port number.
PPPoE: Point-to-Point Protocol over Ethernet. Used to allow ISPs the use of their existing Radius
authentication systems from their Dial-Up service on a Broadband/Ethernet-based service.
RJ-45: An 8-wire connector commonly used to connect multiple computers into a local area
network (LAN). Standard RJ-45 connectors are slightly wider than the standard RJ-11 connector
used for all telephone connections.
Router: A device that forwards packets between various networks using both the network layer
information and router tables. Routers can be used either on a local area network (LAN) or wide
area network (WAN). The most command use for a router is to connect a LAN to an Internet
Service Provider (ISP).
Routing Information Protocol (RIP): One of the most commonly used interior gateway
protocol (IGP) routing protocols on internal networks (and to a lesser extent, networks connected
to the Internet), which helps routers dynamically adapt to changes of network connections by
communicating information about which networks each router can reach and how far away those
networks are.
Routing Table: Table that contains real-time information on all networks available through the
router. Most routing tables include media access control (MAC) and IP address information.
Secure Hash Algorithm-1 (SHA-1): A one-way hash function. This hash function takes variable
length messages and formats it to a fixed length using a 20-byte key to produce a 160-bit hash.
Secure Shell (SSH): A protocol that enables secure device management. SSH is used to securely
manage the appliance.
Security Association (SA): A method for creating a virtual private network (VPN) tunnel. The
SA includes all of the required security perimeters to secure communication. Since this commu-
nication is bi-directional, two SAs are required to establish communication.
Содержание freeGuard Slim 100
Страница 10: ...FSL100 User Guide x ...
Страница 24: ...G E T T I N G ST A R T E D 1 1 14 User Guide ...
Страница 42: ...SY S T E M M A NA G E M E N T 2 2 18 User Guide ...
Страница 50: ...M A N A G I N G T R A F F IC F L O W 3 3 8 User Guide ...
Страница 58: ...C O N F IG U R I N G A TT A C K PRE VE N T I O N 4 4 8 User Guide ...
Страница 84: ...T R A F F I C F LO W R E P O R T I N G 5 5 26 User Guide ...
Страница 122: ...M O N I T O R I N G T R A FF I C 7 7 16 User Guide ...
Страница 134: ...U SI N G S N M P 8 8 12 User Guide ...
Страница 166: ...A L PH AB E T I C LI S T I NG OF LO G M E SS AG E S C C 4 User Guide ...
Страница 170: ...N O TI F I C A T I O N A N D S A F E T Y ST A TE M E N T S Battery Statement D D 4 User Guide ...