18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Glossary</strong><br />

DMZ (demilitarized zone) A network buffer zone that generally hosts services that require interaction<br />

with Internet traffic, while still protecting internal systems. On <strong>Sidewinder</strong>, the<br />

DMZ is generally a burb for hosting Web servers and other hosts that<br />

receiving large volumes <strong>of</strong> external, untrusted traffic.<br />

DNS (domain name<br />

system)<br />

672<br />

A TCP/IP service that maps domain and host names to IP addresses, IP<br />

addresses to domain and host names, and provides information about<br />

services and points <strong>of</strong> contact in a network or the Internet. A set <strong>of</strong> connected<br />

name servers and resolvers allows users to use a host name rather a 32-bit<br />

Internet address.<br />

domain (1) Relative to networking, the portion <strong>of</strong> an Internet address that denotes the<br />

name <strong>of</strong> a computer network. For instance, in the e-address<br />

jones@example.sales.com, the domain is example.sales.com. (2) Relative to<br />

Type Enforcement, an attribute applied to a process running on SecureOS<br />

that determines which system operation the process may perform.<br />

DoS (denial <strong>of</strong> service) Event in which a network experiences a loss <strong>of</strong> a service, like e-mail or a Web<br />

server, that is expected to be available. This event is generally caused by a<br />

malicious attack, but may also happen accidentally.<br />

DSS (defender security<br />

server)<br />

A server made by AssureNet Pathways that can be used to authenticate users<br />

attempting connections through (or to) the <strong>Sidewinder</strong> <strong>G2</strong>. See also<br />

SecureNet Key (SNK).<br />

dynamic password The unique one–time response to a log in challenge or special code<br />

presented by an authentication server. Each password is obtained using a<br />

s<strong>of</strong>tware or hardware authenticator that communicates with a password<br />

generator.<br />

editor A program that can be used to create or modify text files. See also file editor.<br />

encryption Data encryption uses a secret code to scramble information so that it can be<br />

read only by computers using the same code or encryption technology. While<br />

encryption reduces the risk <strong>of</strong> unauthorized access, it does not create a totally<br />

safe networking environment on its own.<br />

end user See user.<br />

event response A response to an alarm event that includes notifying the administrator and/or<br />

performing a Strikeback.<br />

extended authentication<br />

(XAUTH)<br />

An extension <strong>of</strong> the IKE protocol. It provides a mechanism to employ an<br />

administrator–selected authentication mechanism in addition to the existing<br />

IKE authentication (that is, in addition to certificate based or pre-shared key<br />

authentication). It initiates after the existing IKE authentication mechanism is<br />

successful. XAUTH enables use <strong>of</strong> strong authentication (sometimes referred<br />

to as legacy authentication) in VPN configurations.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!