Ericsson HL950 Administrator's Manual page 157

Multi service edge device
Hide thumbs Also See for HL950:
Table of Contents

Advertisement

Multi Service Edge Device HL950
Administrator's Guide
RSA - Rivest, Shamir, and Adelman
A public-key encryption technology developed by RSA Data Security, Inc. The acronym stands for
Rivest, Shamir, and Adelman, the inventors of the technique. The RSA algorithm is based on the fact
that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires
an extraordinary amount of computer processing power and time. The RSA algorithm has become the
de-facto standard for industrial-strength encryption, especially for data sent over the Internet.
RS-232C – Recommended Standard-232C
A standard interface for connecting serial devices. The standard supports two types of connectors – a
25 pin D-type connector (DB-25) and a 9-pin D-type connector (DB-9).
RTS – Request To Send
S
SA – Security Associations
Agreements or negotiations between two or more communicating parties. The details of these
agreements involve decisions on which keys and algorithms are going to be used, and when these
security elements are going to be changed.
SHA – Secure Hash Algorithm
SHDSL – Symmetrical High-speed Digital Subscriber Line
SLA – Service Level Agreement
SME – Small and Medium-sized Enterprises
SNMP – Simple Network Management Protocol
A set of protocols for managing complex networks. SNMP works by sending messages, called
protocol data units (PDUs) to different parts of a network. SNMP-compliant devices, called agents,
store data about themselves in MIBs and return this data to the SNMP requesters.
SNTP – Simple Network Time Protocol
A simplified version of NTP (Network Time Protocol).
SPI – Security Parameter Index
An arbitrary 32-bit value that is assigned to an SA when it is first created. The SPI, when combined
with the destination IP address and security protocol (AH or ESP), uniquely identifies the SA.
Source Routing
Source routing is a strict method of routing datagrams that uses a 32-bit header that embeds a source
address, a destination address, a type of service, and other constants and variables that combine to
protect the datagram from incorrect or failed routing.
Stateful Inspection
One method that a firewall uses to control traffic flowing in and out of the network. This method
doesn't examine the contents of each packet but instead compares certain key parts of the packet to a
database of trusted information. Information traveling from inside the firewall to the outside is
monitored for specific defining characteristics, and then incoming information is compared to these
characteristics. If the comparison yields a reasonable match, the information is allowed through.
Otherwise it is discarded.
Page 157 (159)
EN/LZT 108 5995 R3
June 2003

Advertisement

Table of Contents
loading

Table of Contents