Glossary - McAfee SG310 Administration Manual

Utm firewall
Table of Contents

Advertisement

Glossary

3G
A
ADSL
Advanced Encryption
Standard (AES)
Aggressive Mode
Authentication
Automatic Keying, Internet
Key Exchange (IKE)
B
Block cipher
BOOTP
C
CA Certificate
Certificates
Certificate Authority
Certificate Revocation List
McAfee UTM Firewall 4.0.4 Administration Guide
Third-generation cellular technology. The standards that determine 3G call for greater
bandwidth and higher speeds for cellular networks.
Asymmetric Digital Subscriber Line. A technology allowing high-speed data transfer over
existing telephone lines. ADSL supports data rates between 1.5 and 9 Mbits/s when
receiving data and between 16 and 640 Kbit/s when sending data.
The Advanced Encryption Standard is a new block cipher standard to replace DES,
developed by NIST, the US National Institute of Standards and Technology. AES ciphers
use a 128-bit block and 128-, 192-, or 256-bit keys. The larger block size helps resist
birthday attacks while the large key size prevents brute force attacks.
This Phase 1 keying mode automatically exchanges encryption and authentication keys
and uses less messages in the exchange when compared to Main mode. Aggressive
mode is typically used to allow parties that are configured with a dynamic IP address and
a preshared secret to connect or if the UTM Firewall appliance or the remote party is
behind a NAT device.
Authentication is the technique by which a process verifies that its communication
partner is who it is supposed to be and not an imposter. Authentication confirms that
data is sent to the intended recipient and assures the recipient that the data originated
from the expected sender and has not been altered en route.
This type of keying automatically exchanges encryption and authentication keys and
replaces them periodically.
A method of encrypting text (to produce ciphertext) in which a cryptographic key and
algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a
group rather than to one bit at a time. DES, 3DES and AES are all block ciphers.
Bootstrap Protocol. A protocol that allows a network user to automatically receive an IP
address and have an operating system boot without user interaction. BOOTP is the basis
for the more advanced DHCP.
A self-signed certification authority (CA) certificate that identifies a CA. It is called a CA
certificate because it is the certificate for the root CA.
A digitally signed statement that contains information about an entity and the entity's
public key, thus binding these two pieces of information together. A certificate is issued
by a trusted organization (or entity) called a Certification Authority (CA) after the CA has
verified that the entity is who it says it is.
A Certificate Authority is a trusted third party, which certifies public key's to truly belong
to their claimed owners. It is a key part of any Public Key Infrastructure, since it allows
users to trust that a given public key is the one they wish to use, either to send a private
message to its owner or to verify the signature on a message sent by that owner.
A list of certificates that have been revoked by the CA before they expired. This may be
necessary if the private key certificate has been compromised or if the holder of the
certificate is to be denied the ability to establish a tunnel to the UTM Firewall appliance.
395

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sg560Sg560uSg565Sg580

Table of Contents