Page 321 / 351 Scroll up to view Page 316 - 320
321
encapsulation.
Technique used to enclose information format-
ted for one protocol, such as AppleTalk, within a packet format-
ted for a different protocol, such as TCP/IP.
Encrypt Protocol.
Encryption protocol for the tunnel session.
Parameter values supported include NONE or ESP.
encryption.
The application of a specific algorithm to a data
set so that anyone without the encryption key cannot under-
stand the information.
ESP.
E
ncapsulation S
ecurity P
ayload (ESP) header provides
confidentiality, data origin authentication, connectionless integ-
rity, anti-replay protection, and limited traffic flow confidentiality.
It encrypts the contents of the datagram as specified by the
Security Association. The ESP transformations encrypt and
decrypt portions of datagrams, wrapping or unwrapping the dat-
agram within another IP datagram. Optionally, ESP transforma-
tions may perform data integrity validation and compute an
Integrity Check Value for the datagram being sent. The com-
plete IP datagram is enclosed within the ESP payload.
Ethernet crossover cable.
See crossover cable.
-----F-----
FCS.
Frame Check Sequence. Data included in frames for error
control.
flow control.
Technique using hardware circuits or control char-
acters to regulate the transmission of data between a computer
(or other DTE) and a modem (or other DCE). Typically, the
modem has buffers to hold data; if the buffers approach capac-
Page 322 / 351
322
ity, the modem signals the computer to stop while it catches up
on processing the data in the buffer. See CTS, RTS, xon/xoff.
fragmentation.
Process of breaking a packet into smaller units
so that they can be sent over a network medium that cannot
transmit the complete packet as a unit.
frame.
Logical grouping of information sent as a link-layer unit.
Compare datagram, packet.
FTP.
File Transfer Protocol. Application protocol that lets one IP
node transfer files to and from another node.
FTP server.
Host on network from which clients can transfer
files.
-----H-----
Hard MBytes.
Setting the Hard MBytes parameter forces the
renegotiation of the IPSec Security Associations (SAs) at the
configured Hard MByte value.
The value can be configured between 1 and 1,000,000 MB and
refers to data traffic passed.
Hard Seconds.
Setting the Hard Seconds parameter forces
the renegotiation of the IPSec Security Associations (SAs) at
the configured Hard Seconds value. The value can be config-
ured between 60 and 1,000,000 seconds.
A tunnel will start the process of renegotiation at the soft
threshold and renegotiation
must
happen by the hard limit or
traffic over the tunnel is terminated.
Page 323 / 351
323
hardware handshake.
Method of flow control using two con-
trol lines, usually Request to Send (RTS) and Clear to Send
(CTS).
header.
The portion of a packet, preceding the actual data,
containing source and destination addresses and error-check-
ing fields.
HMAC. H
ash-based
M
essage
A
uthentication
C
ode
hop.
A unit for measuring the number of routers a packet has
passed through when traveling from one network to another.
hop count.
Distance, measured in the number of routers to be
traversed, from a local router to a remote network. See metric.
hub.
Another name for a repeater. The hub is a critical network
element that connects everything to one centralized point. A
hub is simply a box with multiple ports for network connections.
Each device on the network is attached to the hub via an Ether-
net cable.
-----I-----
IKE. I
nternet
K
ey
E
xchange protocol provides automated key
management and is a preferred alternative to manual key man-
agement as it provides better security. Manual key manage-
ment is practical in a small, static environment of two or three
sites. Exchanging the key is done through manual means.
Because IKE provides automated key exchange, it is good for
larger, more dynamic environments.
INSPECTION.
The best option for Internet communications
security is to have an SMLI firewall constantly inspecting the
flow of traffic: determining direction, limiting or eliminating
Page 324 / 351
324
inbound access, and verifying down to the packet level that the
network traffic is only what the customer chooses. The Motor-
ola Netopia® Gateway works like a network super traffic cop,
inspecting and filtering out undesired traffic based on your
security policy and resulting configuration.
interface.
A connection between two devices or networks.
internet address.
IP address. A 32-bit address used to route
packets on a TCP/IP network. In dotted decimal notation, each
eight bits of the 32-bit number are presented as a decimal num-
ber, with the four octets separated by periods.
IPCP.
Internet Protocol Control Protocol. A network control pro-
tocol in PPP specifying how IP communications will be config-
ured and operated over a PPP link.
IPSEC.
A protocol suite defined by the Internet Engineering
Task Force to protect IP traffic at packet level. It can be used for
protecting the data transmitted by any service or application
that is based on IP, but is commonly used for VPNs.
ISAKMP. I
nternet
S
ecurity
A
ssociation and
K
ey
M
anagement
P
rotocol is a framework for creating connection specific param-
eters. It is a protocol for establishing, negotiating, modifying,
and deleting SAs and provides a framework for authentication
and key exchange. ISAKMP is a part of the IKE protocol.
-----K-----
Key Management .
The Key Management algorithm manages
the exchange of security keys in the IPSec protocol architec-
ture. SafeHarbour supports the standard
Internet Key
Exchange (IKE)
Page 325 / 351
325
-----L-----
LCP.
Link Control Protocol. Protocol responsible for negotiating
connection configuration parameters, authenticating peers on
the link, determining whether a link is functioning properly, and
terminating the link. Documented in RFC 1331.
LQM Link Quality Monitoring.
Optional facility that lets PPP
make policy decisions based on the observed quality of the link
between peers. Documented in RFC 1333.
loopback test.
Diagnostic procedure in which data is sent from
a devices's output channel and directed back to its input chan-
nel so that what was sent can be compared to what was
received.
-----M-----
magic number.
Random number generated by a router and
included in packets it sends to other routers. If the router
receives a packet with the same magic number it is using, the
router sends and receives packets with new random numbers
to determine if it is talking to itself.
MD5.
A 128-bit,
m
essage-
d
igest, authentication algorithm used
to create digital signatures. It computes a secure, irreversible,
cryptographically strong hash value for a document. Less
secure than variant SHA-1.
metric.
Distance, measured in the number of routers a packet
must traverse, that a packet must travel to go from a router to a
remote network. A route with a low metric is considered more
efficient, and therefore preferable, to a route with a high metric.
See hop count.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top