Multitech MultiAccess MA30120 User Manual page 173

Communications server
Hide thumbs Also See for MultiAccess MA30120:
Table of Contents

Advertisement

Glossary
– IP NAT is comprised of a series of IETF standards covering various
NAT (Network Address Translation)
implementations of the IP Network Address Translator. NAT translates multiple IP addresses on the private
LAN to one public address that is sent out to the Internet. This adds a level of security since the address of a
PC connected to the private LAN is never transmitted on the Internet.
– The Linux packet filter and network address translation (NAT) system that aims to reduce the
Netfilter
number of filter points and to separate the filtering function from the NAT function. Netfilter is derived from the
Linux ipchains and the Unix ipfilter packet filtering systems. The MultiAccess uses a Linux 2.4 kernel (and, for
example, iptables for the internal logic in the netfilter code).
– The Ethernet PC card used to connect the MultiAccess to the internal, external or DMZ
Network Card
network (aka: NIC or NIC card).
NIC (Network Interface Card)
– The Ethernet PC card used to connect the MultiAccess to the internal,
external or DMZ network (aka, Network Card).
– A Unix program for accessing name servers. The main use is the display of IP names for a given
Nslookup
IP address and vice versa. Beyond that, other information can also be displayed (e.g., aliases).
– An operation that blocks traffic based on a defined set of filter "rules" (e.g., IP address or port
Packet Filter
number filtering).
PCT (Private Communications Technology)
– A protocol developed by Microsoft that is considered more
secure than SSL2. (Note that some web sites may not support the PCT protocol.)
PING (Packet InterNet Groper)
– A program to test reachability of destinations by sending an ICMP echo
request and waiting for a reply. The term is also used as a verb: "Ping host X to see if it is up."
PKI (Public Key Infrastructure)
– Consists of end entities that possess key pairs, certification authorities,
certificate repositories (directories), and all of the other components, software, and entities required when using
public key cryptography.
– Information (text) which has not been encrypted. (The opposite is ciphertext.)
Plaintext
– Where as only the source and target addresses are required for transmission on the IP level, TCP and
Port
UDP require further characteristics to be introduced that allow a differentiation of the separate connections
between two computers. A connection on the TCP and UDP level are thus clearly identified by the source
address and the source port, as well as by the target address and the target port.
– A series of TCP or UDP port numbers that can be set in MultiAccess protocol service definitions.
Port Range
For example, when adding a service from Networks & Services > Services, enter the source (client) port.
The entry options are a single port (e.g. 80), a list separated by commas (e.g. 25, 80, 110), or a port range (e.g.
1024:64000).
– Attempting to find "listening" UDP or TCP ports on an IP device, and then obtaining
Port Scanning
information about the device. Portscanning itself is not harmful, but hackers to allow intrusion by brute-force
password guessing can use it.
– An IETF standard which provides a method for transporting multi-protocol
PPP (Point-to-Point Protocol)
datagrams over point-to-point links. All of the users on the Ethernet connection share a common connection,
so the Ethernet principles supporting multiple users in a LAN are combined with the principles of PPP, which
typically apply t serial connections.
– An IETF standard which provides the ability to connect a
PPPoE (Point-to-Point Protocol over Ethernet)
network of hosts over a simple bridging access device to a remote access concentrator. To provide a point-to-
point connection over Ethernet, each PPP session must learn the Ethernet address of the remote peer, as well
as establish a unique session identifier.
– A protocol that allows secure remote access too corporate
PPTP (Point-To-Point Tunneling Protocol)
networks (VPNs) over the Internet. All data sent over a PPTP connection can be encrypted and compressed,
and multiple network level protocols (TCP/IP, IPX) can be run concurrently. Note: the MultiAccess does NOT
support IPX or Netbeui when using PPTP tunneling.
– A clearly defined and standardized sentence of commands and answers, with whose help a client
Protocol
and a server can communicate. Well-known protocols and the services they provide are, for example, HTTP
(www), FTP (ftp), and NNTP (news).
MultiAccess Communications Server MA30120 User Guide
173

Advertisement

Table of Contents
loading

Table of Contents