User guide
Glossary
Multi-Tech Systems, Inc. RouteFinder RF850/860 User Guide (PN S000400E) 186
Static Route – A directive in a node that tells it to use a certain router or gateway to reach a given IP subnet.
The simplest and most common example is the default router/gateway entry entered onto any IP-connected
node (i.e., a static route telling the node to go to the Internet router for all subnets outside of the local subnet).
Subnet Mask – The subnet mask or the net mask indicates into which groups the addresses are divided. Based
on this arrangement, individual computers are assigned to a network.
S/WAN – Secure Wide Area Network is a Linux implementation of IPSEC and IKE for Linux. At the
RouteFinder’s VPN > IPSec > Add an IKE connection > RSASig > Generate function, the imported key must
meet S/WAN requirements.
Syslog – A service run mostly on Unix and Linux systems (but is also available for most other OSes) to track
events that occur on the system. Other devices on the network may also be configured to use a given node's
syslog server to keep a central log of what each device is doing. Analysis can often be performed on these logs
using available software to create reports detailing various aspects of the system and/or the network.
TCP (Transmission Control Protocol) – A widely used connection-oriented, reliable (but insecure)
communications protocol; the standard transport protocol used on the Internet. TCP is defined in IETF RFC 793.
Telnet – The Internet standard protocol for remote terminal connection service. It is defined in IETF RFC 854
and extended with options by many other RFCs.
TLS (Transport Layer Security) – An open security standard that is similar to SSL3. (Note that some web sites
may not support the TLS protocol.)
Trace Route – A program available on many systems that traces the path a packet takes to a destination. It is
mostly used to debug routing problems between hosts. A Trace Route protocol is defined in IETF RFC 1393.
Trusted Subnetwork – A subnetwork of hosts and routers that can trust each other not to engage in active or
passive attacks. It is also assumed that the underlying communications channel such as a LAN is not being
attacked by any other means.
Tunneling – Transmitting data that is structured in one protocol within the protocol or format of a different
protocol.
UDP (User Datagram Protocol) – A datagram-oriented unreliable communications protocol widely used on the
Internet. It is a layer over the IP protocol. UDP is defined in IETF RFC 768.
UNC (Universal Naming Convention) path – A UNC path is used to help establish a link to a network drive.
URL (Universal Resource Locator) – URLs are used to describe the location of web pages, and are also used
in many other contexts. URLs are defined in IETF RFCs 1738 and 1808.
Verification – The act of recognizing that a person or entity is who or what it claims to be.
VLAN (Virtual Local Area Network) – A function allowing some Ethernet switches to be divided into smaller
logical groups known as VLANs. On most switches each VLAN operates completely independent of the others,
as if each was a separate physical device. Some higher-end switches can also route between VLANs as if each
was a separate hub/switch connected by a router.
VPN (Virtual Private Network) – A device or program that protects users and their data when exchanging
information over the Internet. A VPN can use encryption, user authentication, and/or firewall protection to solve
remote access security threats.
WAN
(Wide Area Network) – A data network, typically extending a LAN beyond a building or campus, linking to
other (remote) LANs.