P
OLICY ROUTING
user-configured policies. Such policies might specify that traffic sent from a particular net-
work should be routed through interface, while all other traffic should be routed through
another interface.
P
R
OLICY
bers and endpoint groups of a policy group communicate.
PPTP (P
is a network protocol that enables the secure transfer of data from a remote client to a pri-
vate enterprise server by creating a virtual private network (VPN) across TCP/IP-based data
networks. PPTP supports on-demand, multi-protocol, virtual private networking over public
networks, such as the Internet.
P
RIVATE
known only to the party or parties that exchange secret messages. In traditional secret key
cryptography, a key would be shared by the communicators so that each could encrypt and
decrypt messages. The risk in this system is that if either party loses the key or it is stolen,
the system is broken. A more recent alternative is to use a combination of public and private
keys. In this system, a public key is used together with a private key.
P
ROFILE
plate to specify configuration parameters to be applied to a device as a result of a policy con-
dition being true.
P
K
UBLIC
combined with a private key derived from the public key, can be used to effectively encrypt
and decrypt messages and digital signatures. The use of combined public and private keys is
known as asymmetric encryption. A system for using public keys is called a public key infra-
structure (PKI).
Quality of Service. In digital circuits, it is a measure of specific error conditions as
Q
S —
O
compared with a standard. The establishment of QoS levels means that transmission rates,
error rates, and other characteristics can be measured, improved, and, to some extent, guar-
anteed in advance. Often related to Class of Service (CoS).
RADIUS —
col and software that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or service.
RADIUS allows a company to maintain user profiles in a central database that all remote
servers can share.
Routing Information Protocol
RIP —
S
-
ELF
SIGNED
A self-signed certificate uses its own certificate request as a signature rather than the signa-
ture of a CA. A self-signed certificate will not provide the same functionality as a CA-signed
certificate. A self-signed certificate will not be automatically recognized by users' browsers,
| Glossary
378
Routing scheme that forwards packets to specific interfaces based on
—
In a policy enforced network (PEN), policy rules determine how the mem-
—
ULES
-
-P
T
OINT
TO
OINT
UNNELING
In cryptography, a private or secret key is an encryption/decryption key
K
—
EY
A profile is an abstract collection of configuration data that is utilized as a tem-
—
A public key is a value provided by some designated authority as a key that,
—
EY
RADIUS (Remote Authentication Dial-In User Service) is a client/server proto-
C
ERTIFICATE
Point-to-Point Tunneling Protocol (PPTP)
P
) —
ROTOCOL
Need help?
Do you have a question about the OpenManage Network Manager and is the answer not in the manual?
Questions and answers