Linksys BEFSX41 manual Appendix H Glossary

Page 67

Instant Broadband® Series

Appendix H: Glossary

3DES - 3DES is a variation on DES that uses a 168-bit key.

Adapter - Printed circuit board that plugs into a PC to add to capabilities or connectivity to a PC.

AppleTalk - An Apple Computer networking system that supports Apple's pro- prietary local talk.

Backbone - The part of a network that connects most of the systems and net- works together and handles the most data.

Bit - A binary digit. The value - 0 or 1-used in the binary numbering system. Also, the smallest form of data.

Boot - To cause the computer to start executing instructions. Personal comput- ers contain built-in instructions in a ROM chip that are automatically executed on startup. These instructions search for the operating system, load it and pass control to it.

Bridge - A device that interconnects different networks together.

Broadband - A data-transmission scheme in which multiple signals share the bandwidth of a medium. This allows the transmission of voice, data and video signals over a single medium. Cable television uses broadband techniques to deliver dozens of channels over one cable.

Browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web or PC. The word "browser" seems to have originated prior to the Web as a generic term for user interfaces that let you browse text files online.

Buffer - A buffer is a shared or assigned memory area used by hardware devices or program processes that operate at different speeds or with different sets of priorities. The buffer allows each device or process to operate without being held up by the other. In order for a buffer to be effective, the size of the buffer and the algorithms for moving data into and out of the buffer need to be considered by the buffer designer. Like a cache, a buffer is a "midpoint holding place" but exists not so much to accelerate the speed of an activity as to sup- port the coordination of separate activities.

EtherFast® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint

Cable Modem - A device that connects a computer to the cable television net- work, which in turn connects to the Internet. Once connected, cable modem users have a continuous connection to the Internet. Cable modems feature asymmetric transfer rates: around 36 Mbps downstream (from the Internet to the computer), and from 200 Kbps to 2 Mbps upstream (from the computer to the Internet).

CAT 5 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems (wires, junctions, and connectors) in terms of the data rates that they can sustain. CAT 5 cable has a maximum throughput of 100 Mbps and is usually utilized for 100BaseTX networks.

Cookie - Data created by a Web server that is stored on a user's computer. It provides a way for the Web site to keep track of a user's patterns and prefer- ences and, with the cooperation of the Web browser, to store them on the user's own hard disk.

Data Packet - One frame in a packet-switched message. Most data communi- cations is based on dividing the transmitted message into packets. For example, an Ethernet packet can be from 64 to 1518 bytes in length.

DDNS (Dynamic Domain Name System) - Allows a network device with a dynamic Internet IP address to have a fixed host and domain name, such as myhostname.mydomainname.com. It is useful when you are hosting your own website, FTP server, or other server behind a router, so people can find your site no matter how often the Internet IP address changes. Using DDNS requires registering with a DDNS service provider on the Internet.

Default Gateway - The routing device used to forward all traffic that is not addressed to a station within the local subnet.

Denial of Service - A protocol that directs the network to no longer respond to requests that might arise as the result of a Denial of Service attack.

Denial of Service Attack - An assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupt- ed.

DES (Digital Encryption Standard) - Encryption used for data communication where both the sender and receiver must know the same secret key, used to

126

127

Image 67
Contents User Guide Copyright & Trademarks Table of Contents Introduction FeaturesEnvironmental 139 IP Addresses An Introduction to LANs and WANsWhy Do I Need a VPN? Network Setup OverviewYour Virtual Private Network VPN Firewall Router to Firewall Router What is a Virtual Private Network?Ports PowerRouter’s Back Panel Modem connection will not work from any other portRouter’s Front Panel LEDs WAN and LAN LEDsProceed to Connect the Router Overview Connecting Your Hardware Together and Booting UpRouter’s hardware installation is now complete Connect the RouterConfiguring Windows 95, 98, and Millennium PCs Configure the PCsConfiguring Windows 2000 PCs Go to Configure the RouterConfiguring Windows XP PCs Configure the Router Enter the Gateway Address Obtain an IP Address AutomaticallyStatic IP Address Advanced Proxies. Click Direct Connection to the InternetRAS PPPoECable/DSL Firewall Router’s Web-based Utility Quick and Easy Router AdministrationSetup Static IP User Name and PasswordWAN IP Firewall IPSec Pass Through Remote UpgradeBlock WAN Request Multicast Pass ThroughVPN Establishing a TunnelLocal Secure Group and Remote Secure Group Remote Security Gateway Encryption AuthenticationKey Management Instant Broadband Series Phase Advanced Settings for Selected IPSec TunnelPassword Other SettingsStatus Dhcp Log Help Filters AdvancedInstant Broadband Series Forwarding UPnP Forwarding Port Triggering Static Routing Dynamic RoutingDMZ Port DMZ HostDMZ Host Address MAC Address Clone Current DMZ HostDdns DynDNS.orgCommon Problems and Solutions Appendix a TroubleshootingTZO.com For Windows XP For Windows NTFor Windows 95, 98, and Me For Windows XP Am not able to access the Router’s web interface Setup Can’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Need to use port triggering Click the Advanced = Filter tabFrequently Asked Questions TCP/IP is compatible with the Router Appendix B Maximizing VPN Security Step One Create an IPSec Policy IntroductionEnvironment Windows 2000 or Windows XPStep Two Build Filter Lists Filter List 1 win-routerIP Address Figure C-6 Filter List 2 router=winTunnel 1 win-router Step Three Configure Individual Tunnel RulesAccept Respond Using IPSec XYZ12345. ClickString to Protect Negotiate Security Key exchange pre Shared key, as shownTunnel 2 router-win XYZ12345 Action Require Security This string to protectKey Exchange Preshared key,Step Four Assign New IPSec Policy Figure C-24Figure C-28 Step Five Create a Tunnel Through the Web-based UtilityAppendix D Snmp Functions Appendix E How to Ping Your ISP’s E-mail & Web AddressesFigure E-1 TCP/IP installation is now complete Appendix F Installing the TCP/IP ProtocolFor Windows NT, 2000, and XP Figure G-1Figure G-5 Appendix H Glossary 129 131 133 135 137 Environmental Appendix I SpecificationsWeb FTP Site Appendix J Warranty InformationAppendix K Contact Information Sales InformationCopyright 2003 Linksys, All Rights Reserved