
824
Glossary
client computer
A computer that is running a client program. In a network, the client computer interacts in a client/
server relationship with another computer that is running a server program.
clientless
A uniform method of providing remote access to diverse resources. Secure access is provided through
a Web-based portal instead of a preinstalled client. The security gateway authenticates users during
the logon to the portal.
clone
To make a specified folder on the host or remote computer that is identical to a specified folder on
another computer. Any files that are in the source folder are copied to the destination folder. Files
that are in the destination folder that are not in the source folder are deleted from the disk. See also
synchronize.
cluster
A group of two or more systems that are linked together to provide continued operation in the event
that one system fails or to balance variable workloads.
clustering
A group of independent systems working together as a single system. Clustering technology allows
groups of servers to access a single disk array containing applications and data.
communications link
A connection between computers (or peripherals) that enables data transfer. A communications link
can be a network, modem, or cable.
communications protocol
A set of rules that are designed to let computers exchange data. A communications protocol defines
issues such as transmission rate, interval type, and mode.
communications session
The time during which two computers maintain a connection and, usually, are engaged in
transferring information.
computer
A defined entity on the LAN or WLAN to which firewall rules and security policies are applied. Not
necessarily a PC, a computer can be any Ethernet-enabled device like a printer or scanner. See also
computer group.
computer group
A group of LAN or WLAN Ethernet devices to which firewall rules and security policies are applied.
For example, all printers may be in a computer group that has all outbound Internet communication
blocked. See also computer.
configuration
A collection of settings that a software feature uses.
configuration settings
The registry settings for client computers that are set during the execution of a console task.
connection
The successful establishment of a communications link.
console
A program interface for the management of software or networks. See also Symantec management
console.
content blocking
The ability to block network traffic based on actual packet content.
content filtering
A subcategory of a security policy that pertains to the semantic meaning of words in text (such as
email messages). This can also include the filtering of URLs.
content scanning or screening
The ability to review the actual information that an end user sees when using a specific Internet
application, for example, the content of email messages.
control
A safeguard that mitigates a vulnerability or exposure and reduces risk. Examples are strong user
passwords, applying vendor patches, and removing unneeded services.
daemon
A program that runs continuously and exists for the purpose of handling periodic service requests
that a computer system expects to receive. The daemon forwards the requests to other programs (or
processes) as appropriate. A typical example of a daemon can be seen on Web servers. Each server
has a Hypertext Transfer Protocol Daemon (HTTPD) that continually waits for requests to come in
from Web clients and their users.
data rate
The speed at which information is moved from one location to another. Data rates are commonly
measured in kilobits (thousand bits), megabits (million bits), and megabytes (million bytes) per
second. Modems, for example, are generally measured in kilobits per second (Kbps). See also
bandwidth, bps (bits per second).
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...