Symantec 10521146 - Network Security 7120 Administration Manual page 353

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

node, standby
notification
object
ODBC (Open Database
Connectivity)
one-time password
online
OOBA (out-of-band
authentication)
open source code
OS (operating system)
packet
The secondary node or nodes in a watchdog process or failover group. Standby nodes
monitor traffic flows on designated network devices, but do not log data unless the active
node fails. Standby nodes wait until the active node is out of commission before becoming
active.
An automatic alert message that notifies a security administrator that an event or error
has occurred, or a predefined response that is triggered by a system condition, such as an
event or error condition. Typical responses include sound or visual signals, such as
displaying a message box, sending email, or paging a security administrator. The security
administrator may be able to configure the response.
A graphical representation of a device or entity on your network with a unique address.
You can create objects to represent network or Network Security devices such as servers or
routers, as well as entities such as network segments or interfaces. The Network Security
console displays objects in the topology tree on the Devices tab.
A standard or open application programming interface (API) for accessing a database. By
using ODBC statements in a program, you can access files in a number of different
databases, including Access, dBase, DB2, Excel, and Text. In addition to the ODBC
software, a separate module or driver is needed for each database to be accessed.
In network security, a password that is issued only once as a result of a challenge-response
authentication process. This cannot be stolen or reused for unauthorized access.
The state of being connected to the Internet. When a user is connected to the Internet, the
user is said to be online.
A one-size-fits-all authentication sequence for protocols that require transparency or
have their own authentication. OOBA allows you to authenticate with proxies, such as
HTTP, SQLnet, and h323, that have not supported authentication on the firewall in the
past.
A program whose source code is available for public inspection and revision. Open source
software is often distributed freely, in the hope that the computing community will
contribute to the program, helping to identify and eliminate bugs. Two well-known
examples of open source programs are the Apache Web server and the Linux operating
system.
The interface between the hardware of the computer and applications (for example a
word-processing program). For personal computers, the most popular operating systems
are MacOS, Windows, DOS, and Linux.
A unit of data that is formed when a protocol breaks down messages that are sent along
the Internet or other networks. Messages are broken down into standard-sized packets to
avoid overloading lines of transmission with large chunks of data. Each of these packets is
separately numbered and includes the Internet address of the destination. Upon arrival at
the recipient computer, the protocol recombines the packets into the original message.
Glossary
353

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents