18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

URL (universal<br />

resource locator)<br />

<strong>Glossary</strong><br />

Provides the address <strong>of</strong> specific documents on the Web. Every Internet<br />

file has a unique URL; they indicate the name <strong>of</strong> the server, the directory,<br />

and the specific document. The form <strong>of</strong> a URL is protocol://pathname. For<br />

example, ftp://www.website.com; http://www.website.com.<br />

user (end user) A collection <strong>of</strong> specific data elements that identify the user to the system,<br />

define the resources to which they have access, the administrative group<br />

to which they belong, and their role within a network structure.<br />

user domain The domain that allows access to all nonsensitive files.<br />

user groups A logical grouping <strong>of</strong> two or more users, identified by a single name.<br />

VPN (virtual private<br />

network)<br />

A method <strong>of</strong> authenticating and encrypting data transmissions between<br />

the machines (<strong>Sidewinder</strong> <strong>G2</strong>-to-<strong>Sidewinder</strong> <strong>G2</strong>, <strong>Sidewinder</strong> <strong>G2</strong>-to-client)<br />

via the Internet. VPN makes it appear as though the networks on the<br />

internal side <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong>s are connected to each other via a pair<br />

<strong>of</strong> routers with a leased line between them.<br />

VPN tunnel A secure route via the Internet between two machines (<strong>Sidewinder</strong> <strong>G2</strong>-to-<br />

<strong>Sidewinder</strong> <strong>G2</strong>, <strong>Sidewinder</strong> <strong>G2</strong>-to-client, etc.) that use authentication and<br />

encryption to transfer data.<br />

warder A <strong>Sidewinder</strong> <strong>G2</strong> server that provides an interface between the proxy<br />

s<strong>of</strong>tware and the various authentication services.<br />

weak authentication A login process that merely requires a user to enter the same password<br />

each time he or she logs in. The “standard” UNIX password process is<br />

considered a weak authentication method. If someone “sniffs” the<br />

password <strong>of</strong>f the phone line or network as it is transmitted they can<br />

conceivably use that password to then break into the system. Because<br />

your internal network is thought to be “trusted,” this type <strong>of</strong><br />

authentication is generally used for authenticating internal-to-external<br />

proxy connections.<br />

TCP/IP (transmission<br />

control protocol/<br />

internet protocol<br />

UDP (User Datagram<br />

Protocol)<br />

A networking protocol suite created for use in the Internet.<br />

A connectionless protocol that transfers data across a network, with only<br />

limited reliability checking or error checking.<br />

Web farm A group <strong>of</strong> computers that host multiple Web servers for one Web site or<br />

a group <strong>of</strong> Web sites belonging to the same company. Load balancing is<br />

<strong>of</strong>ten used to distribute traffic among the servers to handle shifts in<br />

demand.<br />

XAUTH An abbreviation <strong>of</strong> Extended Authentication.<br />

<strong>Glossary</strong> G-15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!