ZyXEL Communications 964 manual Rip, SAP Satan, Snmp, Socks Spam, Stp

Page 50

Prestige 944S Cable Sharing Gateway with 4-port Switch

RIP

Router

SAP

SATAN

Server

Set-Top Box

Shoulder Surfing

SID (Service ID)

SNMP

Snooping

SOCKS

SPAM

Splitter

Spoofing

SSL (Secured Socket Layer)

STP

Straight through

becomes the standard and no further comments or changes are permitted. Change can occur, however, through subsequent RFCs.

Routing Information Protocol is an interior or intra-domain routing protocol that uses the distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers.

A device that connects two networks together. Routers monitor, direct, and filter information that passes between these networks. Because of their location, routers are a good place to install traffic or mail filters. Routers are also prone to attacks because they contain a great deal of information about a network.

In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available services on the network that other network devices can listen to. A server sends out SAP messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network.

A UNIX program that gathers information on networks and stores it in databases. It is helpful in finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems.

A computer, or a software package, that provides a specific kind of service to client software running on other computers.

A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts.

Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer.

Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and the CMTS. The SID is used for the purpose of upstream bandwidth allocation and class-of-service management.

System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network.

Passively watching a network for information that could be used to a hacker's advantage, such as passwords. Usually done while Camping Out.

A protocol that handles TCP traffic through proxy servers.

Unwanted e-mail, usually in the form of advertisements.

Passive devices that divide the traffic on trunk cables and send it down feeder cables.

To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity

Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications.

Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.

A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for

L

Glossary

Image 50 Contents
Users Guide Ver DecemberPage Trademarks CopyrightDisclaimer Federal Communications Commission FCC Interference Statement Information for Canadian Users ZyXEL Limited Warranty Customer Support Telephone/Fax Web Site/FTP Site Regular MailTable of Contents Glossary of Terms List of Figures List of Tables About This Users Guide PrefaceAbout Your Cable Router Related DocumentationSyntax Conventions Page Getting to Know Your Prestige 5-Port Switch & USB interfaceOperation Mode Overview of the PrestigeStatic IP Mode Bridge ModeIP Sharing Mode Key Features of the Prestige DOCSIS/EuroDOCSIS compliant cable modemEuroDOCSIS Specifications Product SpecificationsDocsis Specifications General Specifications Page Hardware Installation and Initial Setup Front Panel LEDs and Back Panel PortsPrestige Rear Panel and Connections Installing TCP/IP Components Additional Installation RequirementsSetting up Your Windows 95/98/Me Computer Configuring TCP/IPConfiguring TCP/IP Properties Setting up Your Windows NT/2000/XP ComputerSetting up Your Macintosh Computer Initializing the Cable Sharing Gateway Factory Default SettingsPrestige factory default Power On Your Prestige Network Configuration of Your ComputerRouter Configuration Web Based Management IntroductionWeb Management Status Basic Web Management BasicAdvanced Web Management Advanced OptionsWeb Management Advanced Options Web Management Advanced IP FilteringWeb Management Advanced IP Filtering Web Management Advanced MAC Filtering Web Management Advanced MAC FilteringWeb Management Advanced Port Filtering Web Management Advanced Port FilteringWeb Management Advanced Forwarding Web Management Advanced ForwardingWeb Management Advanced Port Triggers Web Management Advanced Port TriggersProblems with Internet Access TroubleshootingProblems with Cable Connection Troubleshooting Cable ConnectionPrestige 964 Cable Router Hardware Specifications Appendix aPage Appendix B Important Safety Instructions Page Catv Glossary of TermsARP CDRCSU/DSU CmtsCPE DCEDram DTE EMI FAQ FCCDNS Docsis HFC FTPHdlc Http IanaNAT Ndis Ipcp PPP IPX IRC ISP LANMAC Mcns MSO PAP NICPAC PNSPptp PotsPPP PstnSnmp RIPSAP Satan Socks SpamTftp SUATCP UDP UnixWWW Power adapter Index
Related manuals
Manual 53 pages 45 Kb