User guide
186 WatchGuard Firebox X Edge
Pretty Good Privacy (PGP)
An application and protocol (RFC 1991) for secure email and file encryption.
PGP uses a variety of algorithms, like IDEA, RSA, DSA, MD5, SHA-1, for
providing encryption, authentication, message integrity, and key management.
primary key (IPSec)
An IPSec key responsible for creating a security association. Values can be set in
time or data size.
principle of precedence
Rules that determine which permissions and prohibitions override which others
when creating a combination of security policies.
Privacy Enhanced Mail (PEM)
A protocol to provide secure Internet mail (RFC 1421-1424), including services
for encryption, authentication, message integrity, and key management. PEM
uses ANSI X.509 certificates.
private key
The privately held "secret" component of an integrated asymmetric key pair,
often referred to as the decryption key.
probe
A type of hacking attempt characterized by repetitious, sequential access
attempts. For example, a hacker might try to probe a series of ports for one that
is more open and less secure.
protocol
A set of formal rules describing how to transmit data, especially across a
network. Low-level protocols define the electrical and physical standards to be
observed, bit- and byte-ordering, and the transmission and error detection and
correction of the bit stream. High-level protocols deal with the data formatting,
including the syntax of messages, the terminal-to-computer dialog, character
sets, and sequencing of messages.
provisioning
The process of setting the parameters of the Firebox or SOHO before it is sent to
a customer. With respect to the Firebox, the minimum Policy Manager
configuration is set with the most basic services on the box, Ping and
WatchGuard. Provisioning also sets the IP addresses on the Firebox.
proxy ARP
The technique in which one host, usually a router, answers Address Resolution
Protocol (ARP) requests intended for another machine. By “faking” its identity,
the router accepts responsibility for routing packets to the “real” destination.
proxy server
A server that stands in place of another server. In firewalling, a proxy server
poses as a specific service but has more rigid access and routing rules.