![Motorola Netopia 7000 Скачать руководство пользователя страница 336](http://html.mh-extra.com/html/motorola/netopia-7000/netopia-7000_administrators-handbook_243781336.webp)
Administrator’s Handbook
336
-----I-----
IGMP.
I
nternet
G
roup
M
anagement
P
rotocol allows a router to determine which host groups have members
on a given network segment.
IKE. I
nternet
K
ey
E
xchange protocol provides automated key management and is a preferred alternative to
manual key management as it provides better security. Manual key management is practical in a small,
static environment of two or three sites. Exchanging the key is done through manual means. Because IKE
provides automated key exchange, it is good for larger, more dynamic environments.
INSPECTION.
The best option for Internet communications security is to have an SMLI firewall constantly
inspecting the flow of traffic: determining direction, limiting or eliminating inbound access, and verifying
down to the packet level that the network traffic is only what the customer chooses. The Netopia Gateway
works like a network super traffic cop, inspecting and filtering out undesired traffic based on your security
policy and resulting configuration.
interface.
A connection between two devices or networks.
internet address.
IP address. A 32-bit address used to route packets on a TCP/IP network. In dotted deci-
mal notation, each eight bits of the 32-bit number are presented as a decimal number, with the four octets
separated by periods.
IPCP.
Internet Protocol Control Protocol. A network control protocol in PPP specifying how IP communica-
tions will be configured and operated over a PPP link.
IPSEC.
A protocol suite defined by the Internet Engineering Task Force to protect IP traffic at packet level. It
can be used for protecting the data transmitted by any ser vice or application that is based on IP, but is com-
monly used for VPNs.
ISAKMP. I
nternet
S
ecurity
A
ssociation and
K
ey
M
anagement
P
rotocol is a framework for creating connec-
tion specific parameters. It is a protocol for establishing, negotiating, modifying, and deleting SAs and pro-
vides a framework for authentication and key exchange. ISAKMP is a par t of the IKE protocol.
-----K-----
Key Management .
The Key Management algorithm manages the exchange of security keys in the IPSec
protocol architecture. SafeHarbour suppor ts the standard
Internet Key Exchange (IKE)
-----L-----
LCP.
Link Control Protocol. Protocol responsible for negotiating connection configuration parameters,
authenticating peers on the link, determining whether a link is functioning properly, and terminating the link.
Documented in RFC 1331.
loopback test.
Diagnostic procedure in which data is sent from a devices's output channel and directed
back to its input channel so that what was sent can be compared to what was received.
Содержание Netopia 7000
Страница 18: ...Administrator s Handbook 18 ...
Страница 115: ...115 The screen expands to display the VLAN settings ...
Страница 123: ...123 The Home page for a VoIP enabled Gateway with both phone lines registered is shown below ...
Страница 192: ...Administrator s Handbook 192 ...
Страница 222: ...Administrator s Handbook 222 ...
Страница 324: ...Administrator s Handbook 324 set ip backup gateway default ip_address Specifies the ip address of the default gateway ...
Страница 342: ...Administrator s Handbook 342 ...
Страница 366: ...Administrator s Handbook 366 Z Zero Touch 301 ...
Страница 367: ...367 Motorola Netopia 2200 3300 or 7000 series Motorola Inc 6001 Shellmound Street Emeryville CA 94608 August 2 2007 ...
Страница 368: ...Administrator s Handbook 368 ...