McAfee SG310 Administration Manual page 399

Utm firewall
Table of Contents

Advertisement

Glossary
Phase 2
PPP
PPPoE
PPTP
Preshared secret
Q
Quick Mode
R
Rekeying
Road warrior
Router
RSA Digital Signatures
S
SHA
Security Parameter Index
(SPI)
Subnet mask
Switch
T
TCP/IP
TCP/IP address
TripleDES (3DES)
U
UTC
UTP
McAfee UTM Firewall 4.0.4 Administration Guide
Sets up the encrypted tunnel in IPSec.
Point-to-Point Protocol. A networking protocol for establishing simple links between two
peers.
Point to Point Protocol over Ethernet. A protocol for connecting users on an Ethernet to
the Internet using a common broadband medium (for example, single DSL line, wireless
device, or cable modem).
Point to Point Tunneling Protocol. A protocol developed by Microsoft that is popular for
VPN applications. Although not considered as secure as IPSec, PPP is considered "good
enough" technology. Microsoft has addressed many flaws in the original implementation.
A common secret (passphrase) that is shared between the two parties.
This Phase 2 keying mode automatically exchanges encryption and authentication keys
that actually establishes the encrypted tunnel.
The process of renegotiating a new set of keys for encryption and authentication.
A remote machine with no fixed IP address.
A network device that moves packets of data. A router differs from hubs and switches
because it is intelligent and can route packets to their final destination.
A public/private RSA key pair used for authentication. The UTM Firewall appliance can
generate these key pairs. The public keys need to be exchanged between the two parties
in order to configure the tunnel.
Secure Hash Algorithm, a 160-bit hash. It is one of two message digest algorithms
available in IPSec.
Security Parameter Index, an index used within IPSec to keep connections distinct.
Without the SPI, two connections to the same gateway using the same protocol could
not be distinguished.
See Net mask.
A network device that is similar to a hub, but much smarter. Although not a full router,
a switch particularly understands how to route Internet packets. A switch increases LAN
efficiency by utilizing bandwidth more effectively.
Transmission Control Protocol/Internet Protocol. The basic protocol for Internet
communication.
Fundamental Internet addressing method that uses the form nnn.nnn.nnn.nnn.
Using three DES encryptions on a single data block, with at least two different keys, to
get higher security than is available from a single DES pass.
Coordinated Universal Time.
Unshielded Twisted Pair cabling. A type of Ethernet cable that can operate up to
100Mbits/s. Also known as Category 5 or CAT 5.
399

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sg560Sg560uSg565Sg580

Table of Contents