Stormshield SN series Configuration Manual page 443

Hide thumbs Also See for SN series:
Table of Contents

Advertisement

Private Key
One of two necessary keys in a public or asymmetrical key system. The private key is usually
kept secret by its owner.
Protocol analysis
A method of analysis and intrusion prevention that operates by comparing traffic against the
standards that define the protocols.
Protocols
A set of standardized rules which defines the format and manner of a communication between
two systems. Protocols are used in each layer of the OSI model.
Proxy
System whose function is to relay connections that it intercepts, or which have been addressed
to it. In this way, the proxy substitutes the initiator of the connection and fully recreates a new
connection to the initial destination. Proxy systems can in particular be used to carry out cache
or connection filter operations.
Proxy server
(See Proxy).
Public key
One of two necessary keys in a public or asymmetrical key cryptography. The public key is
usually made known to the public.
PVM (Parallel Virtual Machine)
Software that enables using a set of UNIX workstations linked to a network much like a parallel
workstation.
Q
QID
QoS queue identifier.
QoS (Quality of Service)
A guaranteed throughput level in an information system that allows transporting a given type of
traffic in the right condition, i.e., in terms of availability and throughput. Network resources are as
such optimized and performance is guaranteed on critical applications.
R
RADIUS (Remote Authentication Dial-In User Service)
An access control protocol that uses a client-server method for centralizing authentication data.
User information is forwarded to a RADIUS server, which verifies the information, then authorizes
or prohibits access.
RAID (Redundant array of independent disks)
Hardware architecture that allows accelerating and securing access to data stored on hard disks
and/or making such access reliable. This method is based on the multiplication of hard disks.
Replay
Anti-replay protection means a hacker will not be able to re-send data that have already been
transmitted.
Page 443/448
SNS - USER CONFIGURATION MANUAL V.3
sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
GLOSSARY

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents