Stormshield SN series Configuration Manual page 437

Hide thumbs Also See for SN series:
Table of Contents

Advertisement

Digital signature
Method of verifying identities on a network based on public key encryption.
DMZ (Demilitarized Zone)
Buffer zone of an enterprise's network, situated between the local network and the internet,
behind the firewall. It corresponds to an intermediary network grouping together public servers
(HTTP, SMTP, FTP, etc.) and whose aim is to avoid any direct connection with the internal network
in order to warn it of any external attack from the web.
DNS (Domain Name System)
Distributed database and server system which ensures the translation of domain names used by
internet users into IP addresses to be used by computers, in order for messages to be sent from
one site to another on the network.
Dynamic quarantine
An imposed quarantine following a specific event, e.g., when a particular alarm is raised.
Dynamic routing
Routing that adapts automatically to changes that arise on a network so that packets can be
transported via the best route possible.
E
Encapsulation
A method of transmitting multiple protocols within the same network. The frames of one type of
protocol are carried within the frames of another.
Encryption
The process of translating raw data (known as plaintext) into a seemingly meaningless version
(ciphertext) to protect the confidentiality, integrity and authenticity of the original data. A secret
key is usually needed to unscramble (decrypt) the ciphertext.
Ethernet
Packet switching information network protocol, a technology that allows all hosts on a local
network to connect to the same communication line.
Ethernet port
(See Ethernet).
F
Filtering router
Router which implements packet filters.
Filter policy
One of the more important aspects in the security of the resources that the firewall protects – the
creation of filter rules that allow avoiding network flaws.
Filter rule
A rule created to perform several possible actions on incoming or outgoing packets. Possible
actions include blocking, letting through or disregarding a packet. Rules may also be configured
to generate alarms which will inform the administrator of a certain type of packet passing through.
Page 437/448
SNS - USER CONFIGURATION MANUAL V.3
sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
GLOSSARY

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents