Glossary Of Terms - Planet Networking & Communication MH-5001 User Manual

Multi-homing utm security gateway
Table of Contents

Advertisement

MH-5001 User Manual
Appendix D

Glossary of Terms

Appendix D
Glossary of Terms
CF (Content Filter) –
A content filter is one or more pieces of software that work together to prevent users from viewing material found on the Internet.
This process has two components.
DHCP (Dynamic Host Configuration Protocol) –
Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is based on BOOTP, adding the
capability of automatic allocation of reusable network addresses and additional configuration options. DHCP captures the behavior
of BOOTP relay agents, and DHCP participants can interoperate with BOOTP participants.
DHCP consists of two components: a protocol for delivering host-specific configuration parameters from a DHCP server to a host
and a mechanism for allocation of network addresses to hosts.
DMZ (Demilitarized Zone) –
From the military term for an area between two opponents where fighting is prevented. DMZ Ethernets connect networks and
computers controlled by different bodies. They may be external or internal. External DMZ Ethernets link regional networks with
routers.
Firewall –
A device that protects and controls the connection of one network to another, for traffic both entering and leaving. Firewalls are
used by companies that want to protect any network-connected server from damage (intentional or otherwise) by those who log in to
it. This could be a dedicated computer equipped with security measures or it could be a software-based protection.
IPSec (IP Security) –
IPSec provides security for transmission of sensitive information over unprotected networks such as the Internet. IPSec acts at the
network layer, protecting and authenticating IP packets between participating IPSec devices ("peers").
L2TP (Layer 2 Tunneling Protocol) –
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet Service
Provider (ISP) to enable the operation of a Virtual Private Network (VPN) over the Internet. L2TP merges the best features of two
other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. The two main components that make up L2TP are
the L2TP Access Concentrator (LAC), which is the device that physically terminates a call and the L2TP Network Server (LNS),
which is the device that terminates and possibly authenticates the PPP stream.
NAT (Network Address Translation) –
By the network address translation skill, we can transfer the internal network private address of MH-5001 to the public address for
the Internet usage. By this method, we can use a large amount of private addresses in the enterprise.
POP3 (Post Office Protocol 3) –
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol
in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your
mail-box on the server and download any mail.
PPTP (Point-to-Point Tunneling Protocol) –
PPTP extends the Point to Point Protocol (PPP) standard for traditional dial-up networking. PPTP is best suited for the remote
access applications of VPNs, but it also supports LAN internetworking. PPTP operates at Layer 2 of the OSI model.
231

Advertisement

Table of Contents
loading

Table of Contents