Term
|
Definition
Connection security rule used to specify one or more computers that do not need to be authenticated in order to pass traffic |
|
|
Term
Authentication Header (AH) |
|
Definition
IPSec protocol that provides authentication, integrity, and anti-replay for the entire packet. |
|
|
Term
|
Definition
Security algorithm and type used for IPSec authentication and key exchange. |
|
|
Term
|
Definition
Mathematical value that is used to provide an integrity check for a network packet. |
|
|
Term
Connection Security Rules |
|
Definition
Windows Firewall component that requires two peer computers to mutually authenticate before they can pass information between them. |
|
|
Term
|
Definition
Text files sent by a server to a Web browser, used for authenticating, tracking, and maintaining specific information about users. |
|
|
Term
|
Definition
Connection security rule used to ensure that the computer responds to requests for secure communication |
|
|
Term
|
Definition
Determination of new keying material through a new Diffie-Hellman exchange that takes place on a regular basis |
|
|
Term
Encapsulating Security Payload (ESP) |
|
Definition
IPSec protocol that provides confidentiality (in addition to authentication, integrity, and anti-replay) for the IP payload |
|
|
Term
|
Definition
Windows Firewall configuration item that allows specifically defined traffic to traverse the firewall |
|
|
Term
|
Definition
Attack in which an attacker can falsify or “spoof” the identity of either the sending or receiving computer |
|
|
Term
|
Definition
Suite of protocols used to provide security for TCP/IP hosts at the Internet layer |
|
|
Term
|
Definition
Connection security rule used to restrict inbound and outbound connections. |
|
|
Term
|
Definition
Weakest form of NTLM authentication that has been in use since the earliest days of Windows networking. |
|
|
Term
|
Definition
Process by which network traffic that is defined in one direction will also be defined in the opposite direction |
|
|
Term
|
Definition
User authentication based on the NT LAN Manager authentication protocol. |
|
|
Term
|
Definition
Strongest form of NTLM authentication |
|
|
Term
|
Definition
Computer software or hardware that can intercept and monitor network traffic in real time. |
|
|
Term
|
Definition
Portion of IPSec negotiation in which Security Associations are negotiated and where computers negotiate the primary protocols (AH and/or ESP), hash algorithm, and encryption algorithm to use for data transfer |
|
|
Term
|
Definition
In DHCP, the portion of the TCP/IP address space that is allocated for a particular group of computers, typically on a single subnet. |
|
|
Term
|
Definition
Connection security rule that secures traffic between two servers or two groups of servers |
|
|
Term
|
Definition
IPSec mode used to provide end-to-end security |
|
|
Term
|
Definition
Connection security rule that secures traffic only between two tunnel endpoints and not between the actual hosts that send and receive secured traffic |
|
|
Term
|
Definition
IPSec mode used to provide site-to-site communications that cross the Internet (or other public networks). |
|
|