11.07.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Glossary of termsAt the beginning of communication, an encryption key is requested and transferred usingasymmetrical encryption. This key is then used to encrypt (symmetrically) the data.Subnet maskSubnet mask divides an IP address in two parts: network mask and an address of a host inthe network. The mask has the same format as IP addresses (e.g. 255.255.255.0), but it isdisplayed as a 32-bit number with certain number of left-to-right oriented ones and zeros(mask cannot include other values). Number one in a subnet mask represents a bit of thenetwork address and zero stands for a host’s address bit. All hosts within a particularsubnet must have identical subnet mask and network part of IP address.TLSTransport Layer Security. A later version of SSL, in fact it may be considered as SSLversion 3.1. This version is approved by the IETF and it is accepted by all the top IT companies(i.e. Microsoft Corporation).WebDAVUsing WebDAV (Web Distributed Authoring and Versioning), users can group-edit andorganize files located on servers.WebMailInterface used by <strong>Kerio</strong> MailServer to enable access to email through a web browser.Several user settings (such as message filtering, password, etc.) can be also changedusing <strong>Kerio</strong> WebMail.398

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!