- 行业: Computer
- Number of terms: 2033
- Number of blossaries: 0
- Company Profile:
Symantec Corporation is an computer security software corporation headquartered in Mountain View, California, United States. It is a Fortune 500 company and a member of the S&P 500 stock market index.
The H.323 streaming audiovideo protocol is used by applications such as Net Meeting, TeleVox, and CuSeeMe. The Raptor Firewall can pass H.323 traffic through a standard proxy.
Industry:Network hardware
A route for a specific host address, rather than a network address. Useful for assigning a virtual address.
Industry:Network hardware
This acronym means "HTTP daemon", and refers to the firewall's standard proxy for HTTP, which is installed as part of the Raptor software.
Industry:Network hardware
The HTTPS protocol is sometimes referred to as Secure HTTP, and is basically HTTP over SSL (Secure Socket Layer). The Raptor Firewall's standard HTTP proxy, called httpd, also handles HTTPS traffic via port 443/TCP.
Industry:Network hardware
This acronym means "Internet Key Exchange" and refers to the dynamic keying (Oakley) component of ISAKMP.
Industry:Network hardware
Refers to the ill-advised practice of configuring the hosts on a network with IP addresses that are registered to (that is, owned by) another entity on the Internet. Since the locations of the legitimate owners of these addresses are known to the ISPs, any host with an illegal address that sends packets to the Internet will not receive return packets from the destination host.
Industry:Network hardware
Refers to network traffic that originates from the unprotected side of a Raptor Firewall.
Industry:Network hardware
Every Raptor 6.0 firewall comes equipped with application-level proxies for managing CIFS/SMB, DNS, FTP, Gopher, HTTP, H.323, NTP, NNTP, Ping, realaudio/video, SMTP, and telnet access. The standard proxies provide arguably the most secure means of passing traffic through the Raptor Firewall, as they are governed by authorization rules, perform various application-layer security functions, and perform address hiding and traffic logging.
Industry:Network hardware
Refers to the hosts protected by the firewall. In common parlance, these hosts are behind the firewall, and hence on an inside network. So, by extension, the unprotected networks and hosts are considered to be outside the firewall.
Industry:Network hardware