User guide
162 WatchGuard Firebox X Edge
address space probe
An intrusion measure in which a hacker sequentially attacks IP addresses. These
probes are usually attempts to map IP address space to look for security holes
that a sender might exploit to compromise system security.
agent
A computer program that reports information to another computer or allows
another computer access to the local system. Agents can be used for good or
malice. Many security programs have agent components that report security
information back to a central reporting platform. However, agents can also be
remotely controlled programs hackers use to access machines.
AH (authentication header)
A protocol used in IPSec available for use with IPSec Branch Office VPN. AH
provides authentication for as much of the IP header as possible (except for
mutable fields that are nondeterministic, such as TTL fields) and all upper
protocols and payload. It offers the functionality of ESP except for
confidentiality, which ESP’s encryption provides.
algorithm (encryption)
A set of mathematical rules (logic) used in the processes of encryption and
decryption.
algorithm (hash)
A set of mathematical rules (logic) used in the processes of message digest
creation and key/signature generation.
alias
A shortcut that enables a user to identify a group of hosts, networks, or users
with one identifying name. Aliases are used to speed user authentication and
service configuration.
Application Program Interface (API)
Software that allows dissimilar software products to interact upon one another.
armed
A state of a Firebox in which it is actively guarding against intrusion and attack.
ARP
See
Address Resolution Protocol
.
ARP table
A table of active ARP addresses on a computer.
ascending
A method of ordering a group of items from lowest to highest, such as from A
to Z.
ASN.1 (Abstract Syntax Notation One)
ISO/IEC standard for encoding rules used in ANSI X.509 certificates. Two types
exist: DER (Distinguished Encoding Rules) and BER (Basic Encoding Rules).