18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

G<br />

<strong>Glossary</strong><br />

G-2 <strong>Glossary</strong><br />

Administrative kernel A UNIX kernel that provides the environment needed to perform<br />

administrative tasks such as installing s<strong>of</strong>tware or running a system<br />

backup. When the Administrative kernel is running, all network<br />

connections are disabled and Internet services are not available; Type<br />

Enforcement security is disabled. See also Operational kernel.<br />

alarm event A <strong>Sidewinder</strong> <strong>G2</strong> feature used to monitor your network for potentially<br />

threatening activity, such as an attempted attack or an audit overflow.<br />

When an alarm event is generated, an appropriate event response is<br />

issued.<br />

alias An arbitrary name that a system administrator can assign to a network<br />

element. Aliases can typically be any combination <strong>of</strong> up to 16 characters<br />

(without spaces).<br />

API (application<br />

program interface)<br />

A stable, published s<strong>of</strong>tware interface to an operating system or specific<br />

s<strong>of</strong>tware program by which a programmer writing a custom application<br />

can make requests <strong>of</strong> the operating system or specific s<strong>of</strong>tware program.<br />

(An API provides an easy and standardized connection to a particular<br />

s<strong>of</strong>tware component.).<br />

Application Defenses A feature that is incorporated in proxy rules to configure applicationspecific<br />

properties for each proxy on a per-rule basis. Properties include<br />

basic timeout properties and application-specific permissions, as well as<br />

anti-virus, anti-spam, SSL decryption, and Web services management for<br />

key proxies.<br />

application-layer proxy Also known as an intelligent proxy. Application-layer proxies check<br />

application-layer data as it comes into the <strong>Sidewinder</strong> <strong>G2</strong>. If the data is<br />

compliant with that application’s standard, the <strong>Sidewinder</strong> <strong>G2</strong> initiates a<br />

new connection on its opposite side and passes on the data. If the data is<br />

not compliant, the <strong>Sidewinder</strong> <strong>G2</strong> drops the data.<br />

auditing A method <strong>of</strong> collecting and storing information that can be used to track<br />

system activity (for example authentication attempts, configuration<br />

modifications, stopping and starting <strong>of</strong> services, etc.).<br />

authentication A process that verifies the authenticity <strong>of</strong> a person or system before<br />

allowing access to a network system or service.<br />

authenticator A device or mechanism used to verify the identity <strong>of</strong> an individual logging<br />

onto a network, application, or computer. Authenticators are also called<br />

tokens.<br />

BIND (Berkeley<br />

Internet Name<br />

Domain)<br />

A standard program which implements the Domain Name Service (DNS).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!