Stormshield SN series Configuration Manual page 446

Hide thumbs Also See for SN series:
Table of Contents

Advertisement

Trace route
Mechanism that detects the path a packet took to get from one point to another.
Trojan horse
A code inserted into a seemingly benign program, which when executed, will perform fraudulent
acts such as information theft.
TTL (Time-to-Live)
The period during which information has to be kept or cached.
U
UDP (User Datagram Protocol)
One of the main communication protocols used by the internet, and part of the transport layer in
the TCP/IP stack.
This protocol enables a simple transmission of packets between two entities, each of which has
been defined by an IP address and a port number (to differentiate users connected on the same
host).
Unidirectional translation (MAP)
This translation type allows you to convert real IP addresses on your networks (internal, external
or DMZ) into a virtual IP address on another network (internal, external or DMZ) when passing
through the firewall.
URL filter
Service that enables limiting the consultation of certain websites. Filters can be created in
categories containing prohibited URLs (e.g. Porn, games, webmail sites, etc) or keywords.
URL (Uniform Resource Locator)
Character string used for reaching resources on the web. Informally, it is better known as a web
address.
User enrolment
When an authentication service has been set up, every authorized user has to be defined by
creating a "user" object. The larger the enterprise, the longer this task will take. Stormshield
Network's web enrolment service makes this task easier. If the administrator has defined a PKI,
"unknown" users will now request the creation of their accounts and respective certificates.
UTM (Unified Threat Management)
Concept that consists of providing the most unified solution possible to counter multiple threats
to information security (viruses, worms, Trojan horses, intrusions, spyware, denials de service,
etc).
V
VLAN (Virtual Local Area Network)
Network of computers which behave as if they are connected to the same network even if they
may be physically located on different segments of a LAN. VLAN configuration is done by
software instead of hardware, thereby making it very flexible.
Page 446/448
SNS - USER CONFIGURATION MANUAL V.3
sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
GLOSSARY

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents