Stormshield SN series Configuration Manual page 445

Hide thumbs Also See for SN series:
Table of Contents

Advertisement

SNS - USER CONFIGURATION MANUAL V.3
GLOSSARY
SNMP (Simple Network Management Protocol)
Communication protocol that allows network administrators to manage network devices and to
diagnose network incidents remotely.
SSH (Secure Shell)
Software providing secure logon for Windows and UNIX clients and servers.
SSL (Secure Socket Layer)
Protocol that secures exchanges over the internet. It provides a layer of security (authentication,
integrity, confidentiality) to the application protocols that it supports.
Star topology / Network
A LAN in which all terminals are connected to a central computer, hub or switch by point-to-point
links. A disadvantage of this method is that all data has to pass through the central point, thus
raising the risk of saturation.
Stateful Inspection
Method of filtering network connections invented by Check Point, based on keeping the
connection status. Packets are authorized only if they correspond to normal connections. If a
filter rule allows certain outgoing connections, it will implicitly allow incoming packets that
correspond to the responses of these connections.
Static quarantine
A quarantine that the administrator sets when configuring the firewall.
Stormshield Network REAL-TIME MONITOR
Module in Stormshield Network's Administration Suite that allows viewing the firewall's activity in
real time.
Stormshield Network GLOBAL  ADMINISTRATION
Module in Stormshield Network's Administration Suite that allows configuring firewalls.
Stormshield Network VULNERABILITY MANAGER
Module that allows the network administrator to collect information in real time and to analyze it in
order to weed out possible vulnerabilities that may degrade the network. Some of its functions
include raising ASQ alarms and maintaining an optimal security policy.
Symmetrical key cryptography
A type of cryptographic algorithm in which the same key is used for encryption and decryption.
The difficulty of this method lies in the transmission of the key to the legitimate user. DES, IDEA,
RC2 and RC4 are examples of symmetrical key algorithms.
T
TCP (Transmission Control Protocol)
A reliable transport protocol in connected mode. The TCP session operates in three phases –
establishment of the connection, the transfer of data and the end of the connection.
Throughput
The speed at which a computer processes data, or the rate of information arriving at a particular
point in a network system. For a digital link, this means the number of bits transferred within a
given timeframe. For an internet connection, throughput is expressed in kbps (kilobits per
second).
Page 445/448
sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents