Symantec 460R - Gateway Security Administrator's Manual page 174

Administration guide
Hide thumbs Also See for 460R - Gateway Security:
Table of Contents

Advertisement

174
Glossary
primary server
private key
protocol
proxy
proxy server
public key
RADIUS
RAM (Random Access
Memory)
remote access
remote communication
remote management
reset
response
revision
RIP (Routing Information
Protocol)
roaming
ROM (read-only memory)
router
A computer that is running Symantec AntiVirus Corporate Edition Server software that is responsible for
configuration and virus definitions files update functions in a server group. When you perform a task at the server
group level in Symantec System Center, the task runs on the primary server. The primary server forwards the task to
its secondary servers. If the primary server is running Alert Management System2, it processes all alerts.
A part of asymmetric encryption that uses a private key in conjunction with a public key. The private key is kept
secret, while the public key is sent to those with whom a user expects to communicate. The private key is then used to
encrypt the data, and the corresponding public key is used to decrypt it. The risk in this system is that if either party
loses the key or the key is stolen, the system is broken.
A set of rules for encoding and decoding data so that messages can be exchanged between computers and so that
each computer can fully understand the meaning of the messages. On the Internet, the exchange of information
between different computers is made possible by the suite of protocols known as TCP/IP. Protocols can be stacked,
meaning that one transmission can use two or more protocols. For example, an FTP session uses the FTP protocol to
transfer files, the TCP protocol to manage connections, and the IP protocol to deliver data.
An application (or agent) that runs on the security gateway and acts as both a server and client, accepting
connections from a client and making requests on behalf of the client to the destination server. There are many types
of proxies, each used for specific purposes. See also gateway, proxy server.
A server that acts on behalf of one or more other servers, usually for screening, firewall, caching, or a combination of
these purposes. A proxy server, sometimes called a gateway, is typically used within a company or enterprise to
gather all Internet requests, forward them out to Internet servers, and then receive the responses and in turn
forward them to the original requester within the company.
A part of asymmetric encryption that operates in conjunction with the private key. The sender looks up the public
key of the intended recipient and uses the public key to encrypt the message. The recipient then uses his or her
private key, which is known only to the recipient, to decrypt the message.
Remote Authentication Dial-In User Service: An access control protocol that uses a challenge/response method for
authentication. Used to authenticate users for access to network resources.
The memory that information required by currently running programs is kept in, including the program itself.
Random access refers to the fact that any program can read from or write to any memory register. Many operating
systems limit access to defined memory addresses to protect critical, occupied, or reserved RAM locations from
tampering.
The use of programs that allow access over the Internet from another computer to gain information or to attack or
alter your computer.
The interaction with a host by a remote computer through a telephone connection or another communications line,
such as a network or a direct serial cable connection.
A method of managing the configuration of a product from remote sites other than through a dedicated local
management station. Usually performed with the same interface or look-and-feel as a local management session.
An action that clears any changes made since the last apply or reset action.
The resulting action taken for a predefined event or incident based on predefined criteria.
A collection of configuration settings at any moment in time. As the user makes changes to and validates a
configuration, revisions are created within the SESA framework. These revisions are not made visible to the user.
The oldest dynamic routing protocol on the Internet and the most commonly used dynamic routing protocol on local
area IP networks. Routers use RIP to periodically broadcast routing information for the networks that they know how
to reach.
A wireless network made up of multiple access points that allows seamless movement from one coverage area to
another without leaving the network or interruption of service. See also cell.
The memory that is stored on the hard drive of the appliance. Its contents cannot be accessed or modified by the
computer user, but can only be read.
A device that helps local area networks (LANs) and wide area networks (WANs) achieve interoperability and
connectivity.

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 460R - Gateway Security and is the answer not in the manual?

Table of Contents