Multitech MultiAccess MA30120 User Manual page 174

Communications server
Hide thumbs Also See for MultiAccess MA30120:
Table of Contents

Advertisement

Proxy (Application Gateway)
communication connections between the external network (Internet) and the internal network (LAN). There
must be no direct connection between an internal system and an external computer. The proxies work
exclusively on the application level. Firewalls that are based on proxies use a dual homed gateway that does
not transfer any IP packets. The proxies that run as specialized programs on the gateway can now receive
connections for a special protocol, process the received information at the application level and then transfer
them.
– The technique in which one machine, usually a router answers ARP requests intended for
Proxy ARP
another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real"
destination. Proxy ARP allows a site to use a single IP address with two physical networks. Subnetting would
normally be a better solution.
– In public key cryptography the private key is only known to the holder and it can be used to sign
Private Key
and decrypt messages.
– A cache server that acts as a firewall, protecting the local network. It allows an application inside the
Proxy
proxy to access resources on the global Internet.
PSK (Pre Shared Key)
also called the secret. The holder of this password can establish a VPN connection to the secure network.
Make sure that this password does not reach the wrong hands and that you change the PSK password at
regular intervals.
– In public key cryptography the public key, which is included in the certificate, can be used to
Public Key
verify signatures and encrypt messages. A sample public key is shown below:
Public key cryptography is based on two keys, a private key and a public key. Where conventional
cryptography is a one key system for both locking (encrypting) and unlocking (decrypting) a message, whereas
public key cryptography uses different keys for locking and unlocking. In public-key systems, one key can be
kept private while the other key is made public. Knowing that the public key does not reveal the private key.
– A simple but excellent SSH and Telnet replacement for Windows 95/98/NT that happens to be free.
PuTTY
Installation is simple - you download PuTTY.exe and store it somewhere on your system that's convenient.
– A security-oriented Unix mailer daemon developed by Dan Bernstein.
Qmail
– RADIUS stands for Remote Authentication Dial-In User Service. RADIUS is a protocol with which
RADIUS
the router can obtain information for the user authentication from a central server.
RFC (Request For Comments)
– A policy statement on the implementation of the Domain Style Naming System on the Internet.
RFC 921
RFC 921 details the schedule for the implementation for the Domain Style Naming System in terms of 1) the
names themselves, 2) the method of translating names to addresses, and 3) the relationship between the
Internet and the rest of the world.
– The official IETF specification of the Hostname Server Protocol, a TCP-based hosts information
RFC 953
program and protocol. The function of this server is to deliver machine-readable name/address information
describing networks, gateways, hosts, and eventually domains, within the Internet environment. To access this
server from a program, establish a TCP connection to port 101 (decimal) at the service host, SRI-NIC.ARPA
(26.0.0.73 or 10.0.0.51).
– An IETF standard for Address Allocation for Private Internet.
RFC 1918
MultiAccess Communications Server MA30120 User Guide
– The task of a proxy (Application Gateway) is to completely separate the
– A PSK password must be entered at both ends of the VPN tunnel. This password is
0sAQNic1Twvw7iknvNd6ieKDhd9JTu/Krbc71H4oIFd/xqKJntU8x25
M0Wbxr0gQngECdZPWHj6KeSVtMtslzXMkxDecdawoCadPtPiH/Iln
23GKUOt3GoDVMob+fob9wBYbwdHOxPAYtNQBxNPEU9PGMxQd
Yp8io72cy0duJNCXkEVvpvYvVzkmp0xVYOWYkfjiPsdhnz5FCitEh6
XsCe0ctByoLjKA1C+mLtAlWhuycVojr2JwzSqUIJXzS6nV4yrpI+QY5
o5yztgjVIgwW1Er6jyyo2aeFLgucqjuHSZ+sX0dz/OfdQ0N0AjRAmO3
eknOYLk2DPRkmUeYr3W95q1Z2j/+4GRlzzP8ZoyPwdBv7hpZ0TRA
9c38a26+La8N2/TDKx+fGLfixB6Ed8X0jCmq4It7iD2d/9EWeaUZfctq
aKfw==
– A document of Internet Society under standardization. See also IETF.
Glossary
174

Advertisement

Table of Contents
loading

Table of Contents