18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Glossary</strong><br />

proxy A s<strong>of</strong>tware agent that acts on behalf <strong>of</strong> a user requesting a network<br />

connection through the <strong>Sidewinder</strong> <strong>G2</strong>. Proxies accept a connection from<br />

a user, make a decision as to whether or not the user or client IP address<br />

is permitted to use the proxy, optionally does additional authentication,<br />

and then completes a connection on behalf <strong>of</strong> the user to a remote<br />

destination.<br />

proxy server A server that acts on behalf <strong>of</strong> another server, and may perform tasks such<br />

as caching, access control, or provide a route to a destination server.<br />

Administrators may choose to configure proxy servers as transparent,<br />

meaning the end user is unaware <strong>of</strong> the proxy server’s presence, or nontransparent,<br />

meaning the end user must authenticate to, or interact with,<br />

the server.<br />

public key A public key is used to encrypt messages that only the holder <strong>of</strong> the<br />

corresponding private key can decrypt. Public keys can also be used to<br />

verify the authenticity <strong>of</strong> digitally-signed documents.<br />

public key<br />

cryptography<br />

A class <strong>of</strong> cryptographic methods that employ a pair <strong>of</strong> keys for<br />

encrypting and decrypting messages. A message encrypted with the<br />

public key can only be decrypted with the corresponding private key.<br />

Within a public key cryptography system, the public key may be made<br />

public without compromising the encrypted data. Public key<br />

cryptography enables encryption and digital signatures, and simplifies<br />

cryptographic key distribution through the use <strong>of</strong> a public key<br />

infrastructure.<br />

RADIUS Remote Authentication Dial-In User Service. An authentication protocol<br />

developed by Livingston Enterprises Inc. Recognized by the Internet<br />

Engineering Task Force (IETF) as a dial-in security solution on the<br />

Internet.(RFC 2138).<br />

RAID (redundant array<br />

<strong>of</strong> individual disks)<br />

Stores information on multiple hard disks to provide redundancy. Using<br />

RAID can improve performance and fault-tolerance.<br />

redirected proxy A <strong>Sidewinder</strong> <strong>G2</strong> proxy option that reroutes a connection to a specific<br />

host system, hiding the actual destination address or port from the system<br />

requesting the connection.<br />

reference<br />

implementation<br />

An IETF term. It is the particular implementation <strong>of</strong> the protocol or<br />

standard that is referred to and used in the associated RFC.<br />

registration The process <strong>of</strong> authenticating one <strong>Sidewinder</strong> <strong>G2</strong> to an HA cluster or<br />

One-To-Many cluster. This process establishes an encrypted, trusted<br />

connection between the two systems.<br />

remote management The ability to administer a system from a remote location.<br />

<strong>Glossary</strong> G-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!