18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Glossary</strong><br />

private key The private key is used to decrypt messages that were encrypted with the<br />

corresponding public key. A private key can also be used to digitally sign<br />

messages. The recipient can use the corresponding public key to verify the<br />

authenticity <strong>of</strong> the message.<br />

protocol A set <strong>of</strong> rules by which one entity communicates with another, especially over<br />

a network. This is important when defining rules by which clients and servers<br />

talk to each other over a network. Important protocols become published,<br />

standardized, and widespread.<br />

proxy A s<strong>of</strong>tware agent that acts on behalf <strong>of</strong> a user requesting a network<br />

connection through the <strong>Sidewinder</strong> <strong>G2</strong>. Proxies accept a connection from a<br />

user, make a decision as to whether or not the user or client IP address is<br />

permitted to use the proxy, optionally does additional authentication, and then<br />

completes a connection on behalf <strong>of</strong> the user to a remote destination.<br />

proxy server A server that acts on behalf <strong>of</strong> another server, and may perform tasks such as<br />

caching, access control, or provide a route to a destination server.<br />

Administrators may choose to configure proxy servers as transparent,<br />

meaning the end user is unaware <strong>of</strong> the proxy server’s presence, or nontransparent,<br />

meaning the end user must authenticate to, or interact with, the<br />

server.<br />

public key A public key is used to encrypt messages that only the holder <strong>of</strong> the<br />

corresponding private key can decrypt. Public keys can also be used to verify<br />

the authenticity <strong>of</strong> digitally-signed documents.<br />

public key cryptography A class <strong>of</strong> cryptographic methods that employ a pair <strong>of</strong> keys for encrypting and<br />

decrypting messages. A message encrypted with the public key can only be<br />

decrypted with the corresponding private key. Within a public key<br />

cryptography system, the public key may be made public without<br />

compromising the encrypted data. Public key cryptography enables<br />

encryption and digital signatures, and simplifies cryptographic key distribution<br />

through the use <strong>of</strong> a public key infrastructure.<br />

Quick Start Wizard A Windows-based program that allows you to initially configuration your<br />

<strong>Sidewinder</strong> <strong>G2</strong> or <strong>G2</strong> Enterprise Manager.<br />

RADIUS Remote Authentication Dial-In User Service. An authentication protocol<br />

developed by Livingston Enterprises Inc. Recognized by the Internet<br />

Engineering Task Force (IETF) as a dial-in security solution on the<br />

Internet.(RFC 2138).<br />

RAID (redundant array <strong>of</strong><br />

individual disks)<br />

678<br />

Stores information on multiple hard disks to provide redundancy. Using RAID<br />

can improve performance and fault-tolerance.<br />

redirected proxy A <strong>Sidewinder</strong> <strong>G2</strong> proxy option that reroutes a connection to a specific host<br />

system, hiding the actual destination address or port from the system<br />

requesting the connection.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!