18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Glossary</strong><br />

VPN (virtual private<br />

network)<br />

682<br />

A method <strong>of</strong> authenticating and encrypting data transmissions between the<br />

machines (<strong>Sidewinder</strong> <strong>G2</strong>-to-<strong>Sidewinder</strong> <strong>G2</strong>, <strong>Sidewinder</strong> <strong>G2</strong>-to-client) via the<br />

Internet. VPN makes it appear as though the networks on the internal side <strong>of</strong><br />

the <strong>Sidewinder</strong> <strong>G2</strong>s are connected to each other via a pair <strong>of</strong> routers with a<br />

leased line between them.<br />

VPN tunnel A secure route via the Internet between two machines (<strong>Sidewinder</strong> <strong>G2</strong>-to-<br />

<strong>Sidewinder</strong> <strong>G2</strong>, <strong>Sidewinder</strong> <strong>G2</strong>-to-client, etc.) that use authentication and<br />

encryption to transfer data.<br />

warder A <strong>Sidewinder</strong> <strong>G2</strong> server that provides an interface between the proxy s<strong>of</strong>tware<br />

and the various authentication services.<br />

weak authentication A login process that merely requires a user to enter the same password each<br />

time he or she logs in. The “standard” UNIX password process is considered a<br />

weak authentication method. If someone “sniffs” the password <strong>of</strong>f the phone<br />

line or network as it is transmitted they can conceivably use that password to<br />

then break into the system. Because your internal network is thought to be<br />

“trusted,” this type <strong>of</strong> authentication is generally used for authenticating<br />

internal-to-external proxy connections.<br />

TCP/IP (transmission<br />

control protocol/internet<br />

protocol<br />

UDP (User Datagram<br />

Protocol)<br />

A networking protocol suite created for use in the Internet.<br />

A connectionless protocol that transfers data across a network, with only<br />

limited reliability checking or error checking.<br />

Web farm A group <strong>of</strong> computers that host multiple Web servers for one Web site or a<br />

group <strong>of</strong> Web sites belonging to the same company. Load balancing is <strong>of</strong>ten<br />

used to distribute traffic among the servers to handle shifts in demand.<br />

XAUTH An abbreviation <strong>of</strong> Extended Authentication.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!