User's Manual Part 2

DHCP
300 Check Point Safe@Office User Guide
sensitive data can be stolen
without anyone knowing about
it. Sometimes, tiny programs are
'planted' on the computer that are
designed to watch out for, seize
and then transmit to another
computer, specific types of data.
D
DHCP
Any machine requires a unique
IP address to connect to the
Internet using Internet Protocol.
Dynamic Host Configuration
Protocol (DHCP) is a
communications protocol that
assigns Internet Protocol (IP)
addresses to computers on the
network.
DHCP uses the concept of a
"lease" or amount of time that a
given IP address will be valid for
a computer.
DMZ
A DMZ (demilitarized zone) is
an internal network defined in
addition to the LAN network and
protected by the Safe@Office
appliance.
DNS
The Domain Name System
(DNS) refers to the Internet
domain names, or easy-to-
remember "handles", that are
translated into IP addresses.
An example of a Domain Name
is 'www.sofaware.com'.
Domain Name System
Domain Name System. The
Domain Name System (DNS)
refers to the Internet domain
names, or easy-to-remember
"handles", that are translated into
IP addresses.
An example of a Domain Name
is 'www.sofaware.com'.
E
Exposed Host
An exposed host allows one
computer to be exposed to the
Internet. An example of using an
exposed host would be exposing
a public server, while preventing
outside users from getting direct
access form this server back to
the private network.
F
Firmware
Software embedded in a device.
G
Gateway
A network point that acts as an
entrance to another network.