A
Glossary of Terms
190
IPsec
IP
Security.
With
IPsec
the
data
traffic
can
be
protected
on
IP
level.
IPsec
is
a
vendor
independent
security
architecture
from
the
standardization
organization
IETF.
IP
sub
‐
network
An
IP
sub
‐
network
(or
sub
‐
net
is
a
division
of
network
elements
in
a
network,
based
on
their
IP
address
and
subnet
mask.
IP
spoofing
IP
spoofing,
also
known
as
IP
address
forgery
or
a
host
file
hijack,
is
a
hijacking
technique
in
which
a
cracker
masquerades
as
a
trusted
host
to
conceal
his
identity,
spoof
a
Web
site,
hijack
browsers,
or
gain
access
to
a
network.
Here's
how
it
works:
The
hijacker
obtains
the
IP
address
of
a
legitimate
host
and
alters
packet
headers
so
that
the
legitimate
host
appears
to
be
the
source.
IP
tunneling
Tunneling
means
repackaging
of
information
in
form
of
normal
TCP/IP
packets,
inside
and
then
routing
them
through
the
Internet
within
a
VPN
(Virtual
Private
Network).
In
this
way
you
can
make
up
an
inexpensive
global
private
network.
L2TP
Layer
Two
Tunneling
Protocol
(L2TP)
is
an
extension
of
the
Point
‐
to
‐
Point
Tunneling
Protocol
(PPTP)
used
by
an
Internet
service
provider
(ISP)
to
enable
the
operation
of
a
virtual
private
network
(VPN)
over
the
Internet.
LCP
In
the
Point
‐
to
‐
Point
Protocol
(PPP),
the
Link
Control
Protocol
(LCP)
establishes,
configures,
and
tests
data
‐
link
Internet
connections.
LDAP
Lightweight
Directory
Access
Protocol
(LDAP).
LDAP
is
a
directory
access
protocol
defined
in
RFC
2251
and
RFC
1777
for
accessing
directories
that
support
the
X.500
Directory
model,
while
not
incurring
the
resource
requirements
of
the
X.500
Directory
Access
Protocol
(DAP).
LTE
Long
Term
Evolution
(LTE)
is
the
trademarked
project
name
of
a
high
performance
air
interface
for
cellular
mobile
telephony.
Man
‐
in
‐
the
‐
middle
‐
attack
In
cryptography,
a
man
‐
in
‐
the
‐
middle
attack
(MITM)
is
an
attack
in
which
an
attacker
is
able
to
read,
insert
and
modify
at
will,
messages
between
two
parties
without
either
party
knowing
that
the
link
between
them
has
been
compromised.
The
attacker
must
be
able
to
observe
and
intercept
messages
going
between
the
two
victims.
MCU
Multipoint
Control
Units.