beautypg.com

ZyXEL Communications Broadband Security Gateway P-312 User Manual

Page 242

background image

P312 Broadband Security Gateway

Glossary

U

Events

These are network activities. Some activities are direct attacks on your system, while
others might be depending on the circumstances. Therefore, any activity, regardless of
severity is called an event. An event may or may not be a direct attack on your system.

FAQ

(Frequently Asked Questions) -- FAQs are documents that list and answer the most
common questions on a particular subject.

FCC

The FCC (Federal Communications Commission) is in charge of allocating the
electromagnetic spectrum and thus the bandwidth of various communication systems.

Firewall

A hardware or software "wall" that restricts access in and out of a network. Firewalls
are most often used to separate an internal LAN or WAN from the Internet.

Flash memory

The nonvolatile storage that can be electrically erased and reprogrammed so that data
can be stored, booted, and rewritten as necessary.

FTP

File Transfer Protocol is an Internet file transfer service that operates on the Internet
and over TCP/IP networks. FTP is basically a client/server protocol in which a system
running the FTP server accepts commands from a system running an FTP client. The
service allows users to send commands to the server for uploading and downloading
files. FTP is popular on the Internet because it allows for speedy transfer of large files
between two systems.

Gateway

A gateway is a computer system or other device that acts as a translator between two
systems that do not use the same communication protocols, data formatting
structures, languages, and/or architecture.

Hacker

Generally, a hacker is anyone who enjoys experimenting with technology including
computers and networks. Not all hackers are criminals breaking into systems. Some
are legitimate users and hobbyists. Nevertheless, some are dedicated criminals or
vandals.

HDLC

HDLC (High-level Data Link Control) is a bit-oriented (the data is monitored bit by bit

)

,

link layer protocol for the transmission of data over synchronous networks.

Host

Any computer on a network that is a repository for services available to other
computers on the network. It is quite common to have one host machine provide
several services, such as WWW and USENET.

HTTP

Hyper Text Transfer Protocol. The most common protocol used on the Internet. HTTP
is the primary protocol used for web sites and web browsers. It is also prone to certain
kinds of attacks.

IANA

Internet Assigned Number Authority acts as the clearinghouse to assign and
coordinate the use of numerous Internet protocol parameters such as Internet
addresses, domain names, protocol numbers, and more. The IANA Web site is at
http://www.isi.edu/iana.

ICMP

Internet Control Message Protocol is a message control and error-reporting protocol
between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP)
datagrams, but the messages are processed by the TCP/IP software and are not
directly apparent to the application user.