Instruction manual
NetVanta 2000 Series System Manual Glossary
61200361L1-1E © 2002 ADTRAN, Inc. 205
caching frequently requested web pages and can filter unauthorized user requests for access to files
or designated web sites.
Replay attack
Capturing and storing a password-included packet and then reissuing that packet in an attempt to
gain unauthorized access.
Routing Information Protocol
A protocol for exchanging routing information among gateways and other hosts.
Security Associations
Agreements or negotiations between two or more communicating parties. The details of these
agreements involve decisions on which keys and algorithms are going to be used, and when these
security elements are going to be changed.
Security Parameter Index (SPI)
An arbitrary 32-bit value that is assigned to an SA when it is first created. The SPI, when
combined with the destination IP address and security protocol (AH or ESP), uniquely identifies
the SA.
Source Routing
Source routing is a strict method of routing datagrams that uses a 32-bit header that embeds a
source address, a destination address, a type of service, and other constants and variables that
combine to protect the datagram from incorrect or failed routing.
SYN Flooding
Typically most systems process a queue of about 10 connections attempts (SYNs) at a time. A
malicious intruder who fabricates connection attempts and tries to “flood” a system is using a
denial of service attack known as SYN flooding.
Traffic Shaping
Is a process of minimizing the congestion of a stream of traffic at every connection, physical or
virtual. The net effect is to optimize the overall result.
Virtual Private Network (VPN)
Is a private connection that sends private data traffic over the Internet. This lets organizations
extend network service over the Internet to branch offices and remote users creating a private
WAN (Wide Area Network).