18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Glossary</strong><br />

Administrative kernel A UNIX kernel that provides the environment needed to perform<br />

administrative tasks such as installing s<strong>of</strong>tware or running a system backup.<br />

When the Administrative kernel is running, all network connections are<br />

disabled and Internet services are not available; Type Enforcement security is<br />

disabled. See also Operational kernel.<br />

alarm event A <strong>Sidewinder</strong> <strong>G2</strong> feature used to monitor your network for potentially<br />

threatening activity, such as an attempted attack or an audit overflow. When<br />

an alarm event is generated, an appropriate event response is issued.<br />

alias An arbitrary name that a system administrator can assign to a network<br />

element. Aliases can typically be any combination <strong>of</strong> up to 16 characters<br />

(without spaces).<br />

API (application program<br />

interface)<br />

670<br />

A stable, published s<strong>of</strong>tware interface to an operating system or specific<br />

s<strong>of</strong>tware program by which a programmer writing a custom application can<br />

make requests <strong>of</strong> the operating system or specific s<strong>of</strong>tware program. (An API<br />

provides an easy and standardized connection to a particular s<strong>of</strong>tware<br />

component.).<br />

Application Defenses A feature that is incorporated in proxy rules to configure application-specific<br />

properties for each proxy on a per-rule basis. Properties include basic timeout<br />

properties and application-specific permissions, as well as anti-virus/spyware,<br />

anti-spam/fraud, SSL decryption, and Web services management for key<br />

proxies.<br />

application-layer proxy Also known as an intelligent proxy. Application-layer proxies check<br />

application-layer data as it comes into the <strong>Sidewinder</strong> <strong>G2</strong>. If the data is<br />

compliant with that application’s standard, the <strong>Sidewinder</strong> <strong>G2</strong> initiates a new<br />

connection on its opposite side and passes on the data. If the data is not<br />

compliant, the <strong>Sidewinder</strong> <strong>G2</strong> drops the data.<br />

ARP (address resolution<br />

protocol)<br />

A protocol used to map an IP address to a MAC address. A gratuitous ARP is<br />

a system broadcasting its own information, <strong>of</strong>ten after an address change, so<br />

other devices can update their ARP caches.<br />

auditing A method <strong>of</strong> collecting and storing information that can be used to track<br />

system activity (for example authentication attempts, configuration<br />

modifications, stopping and starting <strong>of</strong> services, etc.).<br />

authentication A process that verifies the authenticity <strong>of</strong> a person or system before allowing<br />

access to a network system or service.<br />

authenticator A device or mechanism used to verify the identity <strong>of</strong> an individual logging onto<br />

a network, application, or computer. Authenticators are also called tokens.<br />

BIND (Berkeley Internet<br />

Name Domain)<br />

A standard program which implements the Domain Name Service (DNS).<br />

BSD/OS The operation system obtained from Wind River, Inc., and used as a base for<br />

developing SecureOS. See also SecureOS

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!