Page 321 / 351 Scroll up to view Page 316 - 320
321
Aggressive Mode. Main mode requires 3 two-way message exchanges while
Aggressive mode only requires 3 total message exchanges.
null modem.
Cable or connection device used to connect two computing
devices directly rather than over a network.
-----P-----
packet.
Logical grouping of information that includes a header and data.
Compare frame, datagram.
PAP.
Password Authentication Protocol. Security protocol within the PPP pro-
tocol suite that prevents unauthorized access to network services. See RFC
1334 for PAP specifications. Compare CHAP.
parity.
Method of checking the integrity of each character received over a
communication channel.
Peer External IP Address.
The Peer External IP Address is the public, or
routable IP address of the remote gateway or VPN server you are establish-
ing the tunnel with.
Peer Internal IP Network.
The Peer Internal IP Network is the private, or
Local Area Network (LAN) address of the remote gateway or VPN Server you
are communicating with.
Peer Internal IP Netmask.
The Peer Internal IP Netmask is the subnet
mask of the Peer Internal IP Network.
PFS Enable.
Enable
P
erfect
F
orward
S
ecrecy. PFS forces a DH negotiation
during Phase II of IKE-IPSec SA exchange. You can disable this or select a
DH group 1, 2, or 5. PFS is a security principle that ensures that any single
key being compromised will permit access to only data protected by that sin-
gle key. In PFS, the key used to protect transmission of data must not be
used to derive any additional keys. If the key was derived from some other
keying material, that material must not be used to derive any more keys.
PING.
Packet INternet Groper. Utility program that uses an ICMP echo mes-
sage and its reply to verify that one network node can reach another. Often
used to verify that two hosts can communicate over a network.
Page 322 / 351
322
PPP.
Point-to-Point Protocol. Provides a method for transmitting datagrams
over serial router-to-router or host-to-network connections using synchronous
or asynchronous circuits.
Pre-Shared Key.
The Pre-Shared Key is a parameter used for authenticating
each side. The value can be an ASCII or Hex and a maximum of 64 charac-
ters
.
Pre-Shared Key Type.
The Pre-Shared Key Type classifies the Pre-Shared
Key. SafeHarbour supports
ASCII
or
HEX
types
protocol.
Formal set of rules and conventions that specify how information
can be exchanged over a network.
PSTN.
Public Switched Telephone Network.
-----Q-----
QoS.
Quality of Service. The ability of a network to prioritize certain kinds of
network traffic to provide reserved bandwidth and reduced latency needed
by some real-time and interactive traffic such as voice and video over IP.
QoS also provides priority for one or more flows, such that one flow does not
make other flows fail.
-----R-----
repeater.
Device that regenerates and propagates electrical signals
between two network segments. Also known as a hub.
RFC.
Request for Comment. Set of documents that specify the conventions
and standards for TCP/IP networking.
RIP.
Routing Information Protocol. Protocol responsible for distributing infor-
mation about available routes and networks from one router to another.
RJ-11.
Four-pin connector used for telephones.
RJ-45.
Eight-pin connector used for 10BaseT (twisted pair Ethernet) net-
works.
Page 323 / 351
323
route.
Path through a network from one node to another. A large internet-
work can have several alternate routes from a source to a destination.
routing table.
Table stored in a router or other networking device that
records available routes and distances for remote network destinations.
-----S-----
SA Encrypt Type.
SA Encryption Type refers to the symmetric encryption
type. This encryption algorithm will be used to encrypt each data packet. SA
Encryption Type values supported include
DES
and
3DES
.
SA Hash Type.
SA Hash Type refers to the Authentication Hash algorithm
used during SA negotiation. Values supported include
MD5 SHA1
. N/A will
display if NONE is chose for Auth Protocol.
Security Association.
From the IPSEC point of view, an SA is a data struc-
ture that describes which transformation is to be applied to a datagram and
how. The SA specifies:
The authentication algorithm for AH and ESP
The encryption algorithm for ESP
The encryption and authentication keys
Lifetime of encryption keys
The lifetime of the SA
Replay prevention sequence number and the replay bit table
An arbitrary 32-bit number called a Security Parameters Index (SPI), as well
as the destination host’s address and the IPSEC protocol identifier, identify
each SA. An SPI is assigned to an SA when the SA is negotiated. The SA can
be referred to by using an SPI in AH and ESP transformations. SA is unidirec-
tional. SAs are commonly setup as bundles, because typically two SAs are
required for communications. SA management is always done on bundles
(setup, delete, relay).
serial communication.
Method of data transmission in which data bits are
transmitted sequentially over a communication channel
SHA-1.
An implementation of the U.S. Government
S
ecure
H
ash
A
lgorithm;
a 160-bit authentication algorithm.
Page 324 / 351
324
Soft MBytes.
Setting the Soft MBytes parameter forces the renegotiation of
the IPSec Security Associations (SAs) at the configured Soft MByte value.
The value can be configured between
1 and 1,000,000 MB
and refers to data
traffic passed. If this value is not achieved, the Hard MBytes parameter is
enforced.
Soft Seconds.
Setting the Soft Seconds parameter forces the renegotiation
of the IPSec Security Associations (SAs) at the configured Soft Seconds
value. The value can be configured between 60 and 1,000,000 seconds.
SPI .
The
S
ecurity
P
arameter
I
ndex is an identifier for the encryption and
authentication algorithm and key. The SPI indicates to the remote firewall
the algorithm and key being used to encrypt and authenticate a packet. It
should be a unique number greater than 255.
SSL.
S
ecure
S
ockets
L
ayer. A protocol developed by Netscape for transmit-
ting private documents via the Internet. SSL uses a cryptographic system
that uses two keys to encrypt data: a public key known to everyone and a
private or secret key known only to the recipient of the message.
STATEFUL.
The Netopia Gateway monitors and maintains the state of any
network transaction. In terms of network request-and-reply, state consists of
the source IP address, destination IP address, communication ports, and
data sequence. The Netopia Gateway processes the stream of a network
conversation, rather than just individual packets. It verifies that packets are
sent from and received by the proper IP addresses along the proper commu-
nication ports in the correct order and that no imposter packets interrupt
the packet flow. Packet filtering monitors only the ports involved, while the
Netopia Gateway analyzes the continuous conversation stream, preventing
session hijacking and denial of service attacks.
static route.
Route entered manually in a routing table.
subnet mask.
A 32-bit address mask that identifies which bits of an IP
address represent network address information and which bits represent
node identifier information.
synchronous communication.
Method of data communication requiring
the transmission of timing signals to keep peers synchronized in sending
and receiving blocks of data.
Page 325 / 351
325
-----T-----
telnet.
IP protocol that lets a user on one host establish and use a virtual
terminal connection to a remote host.
TR-064.
TR-064 is a LAN-side DSL Gateway configuration specification; an
extension of UPnP. It defines more services to locally manage a Gateway.
TR-069.
TR-069 is a WAN-side DSL Gateway Management specification; pro-
vides services similar to UPnP and TR-064. The communication between a
Gateway and management agent in UPnP and TR-064 is strictly over the
LAN, whereas the communication in TR-069 is over the WAN link for some
features and over the LAN for others. TR-069 allows a remote Auto-Config
Server to provision and manage a Gateway.
twisted pair.
Cable consisting of two copper strands twisted around each
other. The twisting provides protection against electromagnetic interference.
-----U-----
UTP.
Unshielded twisted pair cable.
-----V-----
VDSL.
Very high rate Digital Subscriber Line. VDSL transmits high speed
data over short reaches of twisted-pair copper telephone lines, with a range
of speeds depending upon actual line length. Both data channels will be
separated in frequency from bands used for POTS and ISDN, enabling ser-
vice providers to overlay VDSL on existing services. At present the two high
speed channels will also be separated in frequency.
VJ.
Van Jacobson. Abbreviation for a compression standard documented in
RFC 1144.
VLAN.
Virtual Local Area Network. A network of computers that behave as if
they are connected to the same wire even though they may be physically
located on different segments of a LAN. VLANs are configured in software
rather than hardware.

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top