NETGEAR FVM318 Reference Manual page 176

Cable/dsl prosafe wireless vpn security firewall
Hide thumbs Also See for FVM318:
Table of Contents

Advertisement

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
DMZ
DNS
domain name
Domain Name Server
DSL
Asymmetric Digital
Subscriber Line
Dynamic Host
Configuration
Protocol
ESP
ESSID
gateway
IETF
IKE
2
A Demilitarized Zone is used by a company that wants to host its own Internet
services without sacrificing unauthorized access to its private network.
The DMZ sits between the Internet and an internal network's line of defense,
usually some combination of firewalls and bastion hosts. Typically, the DMZ
contains devices accessible to Internet traffic, such as Web (HTTP) servers,
FTP servers, SMTP (e-mail) servers and DNS servers.
See Domain Name Server.
A descriptive name for an address or group of addresses on the Internet.
Domain names are of the form of a registered entity name plus one of a
number of predefined top level suffixes such as .com, .edu, .uk, etc. For
example, in the address mail.NETGEAR.com, mail is a server name and
NETGEAR.com is the domain.
DNS. A Domain Name Server resolves descriptive names of network
resources (such as www.NETGEAR.com) to numeric IP addresses.
See Asymmetric Digital Subscriber Line
A technology for sending data over regular telephone lines. ADSL allows data
rates up to 8 Mbps downstream and 640 Kbps upstream.
DHCP. An Ethernet protocol specifying how a centralized DHCP server can
assign network configuration information to multiple DHCP clients. The
assigned information includes IP addresses, DNS addresses, and gateway
(router) addresses.
Encapsulating Security Payload.
The Extended Service Set Identification (ESSID) is a thirty-two character
(maximum) alphanumeric key identifying the wireless local area network.
A local device, usually a router, that connects hosts on a local network to other
networks.
Internet Engineering Task Force. An open international community of
network designers, operators, vendors, and researchers concerned with the
evolution of the Internet architecture and the smooth operation of the Internet.
Working groups of the IETF propose standard protocols and procedures for
the Internet, which are published as RFCs (Request for Comment) at
www.ietf.org
.
Internet Key Exchange. An automated method for exchanging and managing
encryption keys between two VPN devices.
Glossary

Advertisement

Table of Contents
loading

Table of Contents