Owner's Manual

Glossary
188
ProSafe Network Management Software NMS200
Policy Enforcement Points
(PEP)
In a policy enforced network, a policy enforcement point represents a security
appliance used to protect one or more endpoints. PEPs are also points for monitoring
the health and status of a network. PEPs are generally members of a policy group.
Policy routing Routing scheme that forwards packets to specific interfaces ba
sed on user-configured
policies. Such policies might specify that traffic sent from a particular network should
be routed through interface, while all other traffic should be routed through another
interface.
Policy Rules In a policy enforced network (PEN), policy rules determine how the members and
e
ndpoint groups of a policy group communicate.
PPTP (Point-to-Point
T
unneling Protocol)
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the
secure transfer of data from a remote client to a private enterprise server by creating a
virtual private network (VPN) across TCP/IP-based data networks. PPTP supports
on-demand, multi-protocol, virtual private networking over public networks, such as
the Internet.
Private Key In cryptography, a private or secret key is an encryption
/decryption key known only to
the party or parties that exchange secret messages. In traditional secret key
cryptography, a key would be shared by the communicators so that each could
encrypt and decrypt messages. The risk in this system is that if either party loses the
key or it is stolen, the system is broken. A more recent alternative is to use a
combination of public and private keys. In this system, a public key is used together
with a private key.
Profile A profile is an abstract collection of configura
tion data that is utilized as a template to
specify configuration parameters to be applied to a device as a result of a policy
condition being true.
Public Key A public key is a value provided by some designated authority as a key that, combined
wi
th a private key derived from the public key, can be used to effectively encrypt and
decrypt messages and digital signatures. The use of combined public and private keys
is known as asymmetric encryption. A system for using public keys is called a public
key infrastructure (PKI).
QoS Quality of Service. In digital ci
rcuits, it is a measure of specific error conditions as
compared with a standard. The establishment of QoS levels means that transmission
rates, error rates, and other characteristics can be measured, improved, and, to some
extent, guaranteed in advance. Often related to Class of Service (CoS).
RADIUS RADIUS (Remote Authentication Dial
-In User Service) is a client/server protocol and
software that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or
service. RADIUS allows a company to maintain user profiles in a central database that
all remote servers can share.
RIP Routing Information Protocol
Self-signed Certificate A self-signed certificate uses it
s own certificate request as a signature rather than the
signature of a CA. A self-signed certificate will not provide the same functionality as a
CA-signed certificate. A self-signed certificate will not be automatically recognized by
users' browsers, and a self-signed certificate does not provide any guarantee
concerning the identity of the organization that is providing the website.
SMTP Simple Mail Transfer Protocol.