Glossary - Multitech MultiAccess MA30120 User Manual

Communications server
Hide thumbs Also See for MultiAccess MA30120:
Table of Contents

Advertisement

Glossary

Glossary
– The 'wildcard' character, used to signify "all within this group or function" (e.g., use *
* (Asterisk character)
to specify all domain names). A special symbol that stands for one or more characters. Many operating
systems and applications support wildcards for identifying files and directories. This lets you select multiple files
with a single specification. For example, in DOS and Windows, the asterisk (*) is a wild card that stands for any
combination of letters.
– The character used by the MultiAccess™ Communications Server Web Management
: (colon character)
software for a port range. For example, to enter the S-Port/Client source port number as a port range, enter
1024:64000.
– The character used by the MultiAccess™ Communications Server Web Management
, (comma character)
software for a list of port numbers. For example, to enter the S-Port/Client source port numbers as a list of port
numbers, enter 25, 80, 110.
– An acceptable MultiAccess™ Communications Server Web Management entry field
- (dash character)
character. For example, from Radius > Secret you can enter a shared Secret using alphanumeric characters,
the dash (-) or the space or underline (_) characters.
– An acceptable MultiAccess™ Communications Server Web
_ (space or underscore character)
Management entry field character. For example, from Radius > Secret you can enter a shared Secret using
alphanumeric characters, the dash (-) or the space or underline (_) characters.
– A name, usually short, easy to remember is translated into another name, usually long and difficult to
Alias
remember.
– Anonymous FTP allows a user to retrieve documents, files, programs, and other archived
Anonymous FTP
data from anywhere in the Internet without having to establish a user ID and password. By using the special
user ID of "anonymous" the network user will bypass local security checks and will have access to publicly
accessible files on the remote system.
– An IETF standard that allows an IP node to determine the hardware
ARP (Address Resolution Protocol)
(datalink) address of a neighboring node. ARP provides a method of converting Protocol Addresses (e.g., IP
addresses) to Local Network Addresses (e.g., Ethernet addresses). ARP exists as a low-level protocol within
the TCP/IP suite and is used to "map" IP addresses to Ethernet (or other) addresses (i.e., ARP provides the
physical address when only the logical address is known).
– An attempt at breaking part or all of a cryptosystem; can be either a successful or unsuccessful
Attack
attempt. Many types of attacks can occur (e.g., algebraic attack, birthday attack, brute force attack, chosen
ciphertext attack, chosen plain text attack, known plain text attack, linear cryptanalysis, and middleperson
attack).
– The action of verifying information such as identity, ownership or authorization.
Authentication
Authentication is a security process where user access is allowed only if user authentication verifies the identity
of the user requesting access to network resources. Authentication is one of the functions of IPSec.
Authentication establishes the integrity of a data stream, ensures that it is not tampered with in transit, and
confirms the data stream's origin. Authentication establishes the legitimacy of users and defines the allowed
parameters of the session they establish.
– The address that a computer refers to if it wants to address all the computers of a network.
Broadcast
Example: for a network with the IP address 212.6.145.0 and a net mask 225.225.225.240, a broadcast would
be the address 212.6.145.15.
CSS (Cascading Style Sheets)
– HTML was intended to mark up only a Web page's structure, but not its on-
screen display characteristics. For Web page appearances, the World Wide Web Consortium (W3C) developed
a complementary markup system called Cascading Style Sheets (CSS) to make it easier to define a page's
appearance without affecting its HTML structure. HTML can be frustrating when trying to control the
appearance of a Web page and its contents. Style sheets work like templates: you define the style for a
MultiAccess Communications Server MA30120 User Guide
167

Advertisement

Table of Contents
loading

Table of Contents