Watchguard Firebox X20E Reference Manual page 74

Vpn gateway
Hide thumbs Also See for Firebox X20E:
Table of Contents

Advertisement

spam
The practice of sending unsolicited e-mail to many recipients, much like an
electronic version of junk mail.
spoofing
Altering packets to falsely identify the originating computer to confuse or
attack another computer. The originating computer is usually misidentified as
a trusted computer within an organization.
SSL (Secure Sockets Layer)
A protocol for transmitting private documents over the Internet. SSL works
by using a private key to encrypt data transferred over an SSL connection.
stance
The policy of a firewall regarding the default handling of IP packets. Stance
dictates what the firewall will do with any given packet in the absence of
explicit instructions. WatchGuard's default stance is to discard all packets that
are not explicitly allowed, often stated as "That which is not explicitly allowed
is denied."
static NAT
Static network address translation works on a host-to-host basis. Incoming
packets destined for a public address on an external network are remapped to
an address behind the firewall.
subnet
To split a network into multiple smaller networks. For example, one could
take a class C network with 256 available addresses and create two additional
netmasks under it that separate the first 128 and last 128 addresses into
separate identifiable networks. Subnetting enables a client with a single
network to create multiple networks; the advanced or multiple network
configurations can then be used when setting up the Firebox.
TCP (Transmission Control Protocol)
A reliable byte-streaming protocol that implements a virtual connection. Most
long-haul traffic on the Internet uses TCP.
Telnet
A terminal emulation program for TCP/IP networks. It runs on a computer
and connects a workstation to a server on a network.
tooltip
A name or phrase that appears when you pause the mouse pointer over a
button or icon.
triple-DES
An advanced form of encryption using three keys rather than one or two. It is
roughly as secure as single DES would be if it had a 112-bit key.
Trusted interface
The interface on the Firebox that connects to the internal network, which
should be protected to the maximum practical amount.
70

Advertisement

Table of Contents
loading

This manual is also suitable for:

Firebox system 4.6Firebox x55eFirebox x10e

Table of Contents