User`s guide
Glossary
248
File Transfer Protocol (FTP)
A standard Internet protocol that specifies the simplest way to exchange files between computers 
on the Internet. 
HyperText Transfer Protocol (HTTP)
An application protocol in the TCP/IP suite that defines the rules for transferring files (text, 
graphic images, sound, video, and other multimedia files) on the World Wide web (WWW).
HyperText Transfer Protocol over Secure Socket Layer (HTTPS)
A secure message-oriented communications protocol designed for use in conjunction with 
HTTP. HTTPS encrypts and decrypts user page requests as well as the pages that are returned 
by the web server. HTTPS uses the Secure Socket Layer (SSL) as a sublayer.
Internet Control Message Protocol (ICMP)
A message control and error-reporting protocol between a host server and a gateway to the 
Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages are processed by the IP 
software and are not directly apparent to the application user.
Internet Group Management Protocol (IGMP)
Internet Group Management Protocol (IGMP) provides a way for an Internet computer to report 
its multicast group membership to adjacent routers. Multicasting allows one computer on the 
Internet to send content to multiple other computers that have identified themselves as interested 
in receiving the originating computer's content. Multicasting can be used for such applications 
as updating the address books of mobile computer users in the field, sending out company 
newsletters to a distribution list, and “broadcasting” high-bandwidth programs of streaming 
media to an audience that has “tuned in” by setting up a multicast group membership.
IP filtering
A network configuration that can be enabled to establish rules allowing devices to permit or deny 
specific IP addresses, networks, or devices from connection access. Also known as access 
control list.
IPsec (Internet Protocol Security)
A framework for a set of protocols for security at the network or packet processing layer of 
network communication. Earlier security approaches have inserted security at the application 
layer of the communications model. IPsec is said to be especially useful for implementing virtual 
private networks and for remote user access through dial-up connection to private networks. An 
advantage of IPsec is that security arrangements can be handled without requiring changes to 
individual user computers.
IPsec provides two choices of security service: Authentication Header (AH), which essentially 
allows authentication of the sender of data, and Encapsulating Security Payload (ESP), which 
supports both authentication of the sender and encryption of data as well. The specific 
information associated with each of these services is inserted into the packet in a header that 
follows the IP packet header. Separate key protocols can be selected, such as the ISAKMP/
Oakley protocol. 










