Fortinet FortiGate FortiGate-5001 Administration Manual page 381

Fortigate 5000 series
Hide thumbs Also See for FortiGate FortiGate-5001:
Table of Contents

Advertisement

SNMP, Simple Network Management Protocol: A set
of protocols for managing networks. SNMP agents
store and return data about themselves to SNMP
requesters.
spam: Unsolicited email.
SSH, Secure Shell: An application that enables users
to log into a remote computer and run commands
securely.
SSL, Secure Sockets Layer: An Internet security
protocol that uses private and public encryption keys
and certificates to keeps transactions private.
state synchronization: The part of the FGCP that
maintains connections after failover.
subnet, subnetwork: A logical network comprising
devices whose IP addresses have the same network
prefix. For example, all devices having IP addresses in
the 192.168.10.0/24 range can be accessed on the
same subnet. See also netmask.
subordinate unit: Also called the subordinate cluster
unit, each cluster contains one or more cluster units
that are not functioning as the primary unit.
Subordinate units are always waiting to become the
primary unit. If a subordinate unit does not receive
hello packets from the primary cluster unit, it attempts
to become the primary unit.
FortiGate-5000 series Administration Guide
In an active-active cluster, subordinate units keep track
of cluster connections, keep their configurations and
routing tables synchronized with the primary unit, and
process network traffic assigned to them by the primary
unit. In an active-passive cluster, subordinate units do
not process network traffic. However, active-passive
subordinate units track cluster connections and keep
their configurations and routing tables synchronized
with the primary unit.
The FortiGate firmware uses the terms "slave" and
"subsidiary unit" to refer to a subordinate cluster unit.
TCP, Transmission Control Protocol: One of the
main protocols in TCP/IP networks. TCP guarantees
delivery of data and also guarantees that packets are
delivered in the same order sent.
trojan horse: A harmful program that disguises itself
as another program.
UDP, User Datagram Protocol: A connectionless
protocol that runs on IP networks and is used primarily
for broadcasting messages throughout the network.
virus: A computer program that replicates and spreads
itself through computers or networks, usually with
harmful intent.
VPN, Virtual Private Network: A secure logical
network created from physically separate networks.
VPNs use encryption and other security mechanisms
to ensure that only authorized users can access the
network and that data transmitted between VPN
devices cannot be intercepted.
worm: A harmful program that replicates itself until it
fills a computer or network, which can shut the system
down.
01-28008-0013-20050204
Glossary
381

Advertisement

Table of Contents
loading

Table of Contents