User guide
Reference Guide 159
Privacy Enhanced Mail (PEM)
A protocol to provide secure Internet mail (RFC 1421-1424),
including services for encryption, authentication, message
integrity, and key management. PEM uses ANSI X.509 certificates.
private key
The privately held "secret" component of an integrated
asymmetric key pair, often referred to as the decryption key.
protocol
A set of formal rules describing how to transmit data, especially
across a network. Low-level protocols define the electrical and
physical standards to be observed, bit- and byte-ordering, and the
transmission and error detection and correction of the bit stream.
High-level protocols deal with the data formatting, including the
syntax of messages, the terminal-to-computer dialog, character
sets, and sequencing of messages.
public key
The publicly available component of an integrated asymmetric
key pair, often referred to as the encryption key.
public key cryptography
Cryptography in which a public and private key pair is used, and
no security is needed in the channel itself.
probe
A type of hacking attempt characterized by repetitious, sequential
access attempts. For example, a hacker might try to probe a series
of ports for one that is more open and less secure.
provisioning
The process of setting the parameters of the Firebox or SOHO
before it is sent to a customer. With respect to the Firebox, the
minimum Policy Manager configuration is set with the most basic
services on the box, Ping and WatchGuard. Provisioning also sets
the IP addresses on the Firebox.
proxy ARP
The technique in which one host, usually a router, answers
Address Resolution Protocol (ARP) requests intended for another
machine. By “faking” its identity, the router accepts responsibility
for routing packets to the “real” destination.