18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Glossary</strong><br />

internal DNS Manages DNS information only available to internal machines. The<br />

internal name server cannot receive queries from external hosts since it<br />

cannot communicate directly with the external network. Resolution <strong>of</strong><br />

external DNS information both for the <strong>Sidewinder</strong> <strong>G2</strong> itself and to handle<br />

internal queries for external information are handled by the internal name<br />

server. Although it is unable to communicate directly with external hosts,<br />

it is able to send queries and receive the responses via the external DNS.<br />

IP address A 32- bit address that uses standard dotted quad notation assigned to<br />

TCP/IP network devices. An IP address is unique to each machine on the<br />

Internet. An IP address contains a network and host field.<br />

IP Filter Provides the ability to specify rules to allow IP-based traffic to flow<br />

through the <strong>Sidewinder</strong> <strong>G2</strong> at the network layer. For example, traffic may<br />

pass through the <strong>Sidewinder</strong> <strong>G2</strong> without being passed to the application<br />

proxies. IP Filter can be used for tracking TCP session states, and is<br />

sometime referred to as "stateful inspection."<br />

IPSec (Internet<br />

Protocol Security)<br />

ISAKMP (internet<br />

security association<br />

and key management<br />

protocol)<br />

ISP (Internet Service<br />

Provider)<br />

A set <strong>of</strong> standards created to provide data integrity and confidentiality at<br />

the IP layer <strong>of</strong> the network stack.<br />

A protocol framework which sets the parameters for a VPN connection by<br />

defining the payload format, how the key exchange protocol will be<br />

implemented, and how the security association will be negotiated.<br />

A company that provides individuals and other companies access to the<br />

Internet and other related services such as Web site building and virtual<br />

hosting. An ISP has the equipment and the telecommunication line access<br />

required to have a point-<strong>of</strong>-presence (POP) on the Internet for the<br />

geographic area served.<br />

kernel Manages all physical resources, including scheduling <strong>of</strong> processes, virtual<br />

memory, file system management, reading and writing files to disk or<br />

tape, printing, and network communications. The <strong>Sidewinder</strong> <strong>G2</strong> is run in<br />

one <strong>of</strong> two kernels: the operational kernel or the administrative kernel.<br />

key pair The reference to a private key and a mathematically-related public key.<br />

The private key is safeguarded by the owner, and known only to them.<br />

The public key can be distributed to anyone. This allows one key to be<br />

used for encryption, and the other key to be used for decryption.<br />

key pair generation The process <strong>of</strong> generating mathematically-related public/private key pairs.<br />

LDAP Lightweight Directory Access Protocol. An internet standard for directory<br />

services that run over TCP/IP.<br />

<strong>Glossary</strong> G-7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!