Page 316 / 351 Scroll up to view Page 311 - 315
316
encapsulation.
Technique used to enclose information formatted for one
protocol, such as AppleTalk, within a packet formatted for a different proto-
col, such as TCP/IP.
Encrypt Protocol.
Encryption protocol for the tunnel session.
Parameter values supported include NONE or ESP.
encryption.
The application of a specific algorithm to a data set so that any-
one without the encryption key cannot understand the information.
ESP.
E
ncapsulation S
ecurity P
ayload (ESP) header provides confidentiality,
data origin authentication, connectionless integrity, anti-replay protection,
and limited traffic flow confidentiality. It encrypts the contents of the data-
gram as specified by the Security Association. The ESP transformations
encrypt and decrypt portions of datagrams, wrapping or unwrapping the dat-
agram within another IP datagram. Optionally, ESP transformations may per-
form data integrity validation and compute an Integrity Check Value for the
datagram being sent. The complete IP datagram is enclosed within the ESP
payload.
Ethernet crossover cable.
See crossover cable.
-----F-----
FCS.
Frame Check Sequence. Data included in frames for error control.
flow control.
Technique using hardware circuits or control characters to reg-
ulate the transmission of data between a computer (or other DTE) and a
modem (or other DCE). Typically, the modem has buffers to hold data; if the
buffers approach capacity, the modem signals the computer to stop while it
catches up on processing the data in the buffer. See CTS, RTS, xon/xoff.
fragmentation.
Process of breaking a packet into smaller units so that they
can be sent over a network medium that cannot transmit the complete
packet as a unit.
frame.
Logical grouping of information sent as a link-layer unit. Compare
datagram, packet.
Page 317 / 351
317
FTP.
File Transfer Protocol. Application protocol that lets one IP node trans-
fer files to and from another node.
FTP server.
Host on network from which clients can transfer files.
-----H-----
Hard MBytes.
Setting the Hard MBytes parameter forces the renegotiation
of the IPSec Security Associations (SAs) at the configured Hard MByte value.
The value can be configured between 1 and 1,000,000 MB and refers to
data traffic passed.
Hard Seconds.
Setting the Hard Seconds parameter forces the renegotia-
tion of the IPSec Security Associations (SAs) at the configured Hard Seconds
value. The value can be configured between 60 and 1,000,000 seconds.
A tunnel will start the process of renegotiation at the soft threshold and
renegotiation
must
happen by the hard limit or traffic over the tunnel is ter-
minated.
hardware handshake.
Method of flow control using two control lines, usu-
ally Request to Send (RTS) and Clear to Send (CTS).
header.
The portion of a packet, preceding the actual data, containing
source and destination addresses and error-checking fields.
HMAC. H
ash-based
M
essage
A
uthentication
C
ode
hop.
A unit for measuring the number of routers a packet has passed
through when traveling from one network to another.
hop count.
Distance, measured in the number of routers to be traversed,
from a local router to a remote network. See metric.
hub.
Another name for a repeater. The hub is a critical network element that
connects everything to one centralized point. A hub is simply a box with mul-
tiple ports for network connections. Each device on the network is attached
to the hub via an Ethernet cable.
Page 318 / 351
318
-----I-----
IGMP.
I
nternet
G
roup
M
anagement
P
rotocol allows a router to determine
which host groups have members on a given network segment.
IKE. I
nternet
K
ey
E
xchange protocol provides automated key management
and is a preferred alternative to manual key management as it provides bet-
ter security. Manual key management is practical in a small, static environ-
ment of two or three sites. Exchanging the key is done through manual
means. Because IKE provides automated key exchange, it is good for larger,
more dynamic environments.
INSPECTION.
The best option for Internet communications security is to
have an SMLI firewall constantly inspecting the flow of traffic: determining
direction, limiting or eliminating inbound access, and verifying down to the
packet level that the network traffic is only what the customer chooses. The
Netopia Gateway works like a network super traffic cop, inspecting and filter-
ing out undesired traffic based on your security policy and resulting configu-
ration.
interface.
A connection between two devices or networks.
internet address.
IP address. A 32-bit address used to route packets on a
TCP/IP network. In dotted decimal notation, each eight bits of the 32-bit
number are presented as a decimal number, with the four octets separated
by periods.
IPCP.
Internet Protocol Control Protocol. A network control protocol in PPP
specifying how IP communications will be configured and operated over a
PPP link.
IPSEC.
A protocol suite defined by the Internet Engineering Task Force to
protect IP traffic at packet level. It can be used for protecting the data trans-
mitted by any service or application that is based on IP, but is commonly
used for VPNs.
ISAKMP. I
nternet
S
ecurity
A
ssociation and
K
ey
M
anagement
P
rotocol is a
framework for creating connection specific parameters. It is a protocol for
establishing, negotiating, modifying, and deleting SAs and provides a frame-
work for authentication and key exchange. ISAKMP is a part of the IKE proto-
col.
Page 319 / 351
319
-----K-----
Key Management .
The Key Management algorithm manages the exchange
of security keys in the IPSec protocol architecture. SafeHarbour supports
the standard
Internet Key Exchange (IKE)
-----L-----
LCP.
Link Control Protocol. Protocol responsible for negotiating connection
configuration parameters, authenticating peers on the link, determining
whether a link is functioning properly, and terminating the link. Documented
in RFC 1331.
LQM Link Quality Monitoring.
Optional facility that lets PPP make policy
decisions based on the observed quality of the link between peers. Docu-
mented in RFC 1333.
loopback test.
Diagnostic procedure in which data is sent from a devices's
output channel and directed back to its input channel so that what was sent
can be compared to what was received.
-----M-----
magic number.
Random number generated by a router and included in
packets it sends to other routers. If the router receives a packet with the
same magic number it is using, the router sends and receives packets with
new random numbers to determine if it is talking to itself.
MD5.
A 128-bit,
m
essage-
d
igest, authentication algorithm used to create
digital signatures. It computes a secure, irreversible, cryptographically
strong hash value for a document. Less secure than variant SHA-1.
metric.
Distance, measured in the number of routers a packet must
traverse, that a packet must travel to go from a router to a remote network.
A route with a low metric is considered more efficient, and therefore prefera-
ble, to a route with a high metric. See hop count.
modem.
Modulator/demodulator. Device used to convert a digital signal to
an analog signal for transmission over standard telephone lines. A modem
Page 320 / 351
320
at the other end of the connection converts the analog signal back to a digi-
tal signal.
MRU.
Maximum Receive Unit. The maximum packet size, in bytes, that a
network interface will accept.
MSSID.
M
ultiple
S
ervice
S
et
ID
entifier. Unique identifiers of data sent over a
wireless connection that act as passwords when wireless devices try to join
wireless networks. An SSID differentiates one wireless network from
another, so all access points and all devices attempting to connect to a spe-
cific network must use the same SSID. Netopia Gateways support up to four
SSIDs.
SSIDs are also sometimes referred to as
Network Names
because they are
names that identify wireless networks.
MTU.
Maximum Transmission Unit. The maximum packet size, in bytes, that
can be sent over a network interface.
MULTI-LAYER.
The Open System Interconnection (OSI) model divides net-
work traffic into seven distinct levels, from the Physical (hardware) layer to
the Application (software) layer. Those in between are the Presentation, Ses-
sion, Transport, Network, and Data Link layers. Simple first and second gen-
eration firewall technologies
inspect between 1 and 3 layers of the 7 layer
model, while our SMLI engine inspects layers 2 through 7.
-----N-----
NAK.
Negative acknowledgment. See ACK.
Name.
The Name parameter refers to the name of the configured tunnel.
This is mainly used as an identifier for the administrator. The Name parame-
ter is an ASCII and is limited to 31 characters. The tunnel name is the only
IPSec parameter that does not need to match the peer gateway.
NCP.
Network Control Protocol.
Negotiation Method.
This parameter refers to the method used during the
Phase I key exchange, or IKE process. SafeHarbour supports Main or

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top