Glossary
IKE (Internet Key Exchange)
Internet Key Exchange (IKE) is used to negotiate the keying material that is used by the VPN encryption and integrity algorithms. IKE is a
IM filters
IM filters detect and control traffic from Instant Messaging applications such as Yahoo Messenger or MSN Messenger, chat, file transfer and photo sharing. These filters can be used to block the operation of the Instant Messaging application. Many of the IM filters can also be used to rate limit traffic from IM applications. These filters are part of the Performance Protection (see page 311) filter category.
Infrastructure Protection
Category of filter types that protect network bandwidth and network infrastructure elements such as routers and firewalls from attack using a combination of traffic normalization, DDoS protection, and application, protocol, and network equipment protection. These filters include DDoS, network equipment protection, and traffic normalization filters.
Intrusion Prevention System (IPS)
The TippingPoint Intrusion Prevention System in the X family device is an active network defense system that provides true intrusion prevention. Unlike intrusion detection systems, the IPS continually cleanses Internet and Intranet traffic, identifying and preventing attacks before damage to critical resources occurs, ensuring network integrity and ultimately improving return on investment.
IP filter
A filter that blocks traffic based on the source, destination, port, protocol, and other parameters of the traffic.
IP interface
An IP interface is the Layer 3 configuration, that is, the IP configuration for its set of security zones (and hence Ethernet ports within the security zone. IP interfaces provide the X family device with the IP interfaces that it needs for the network connections you require.
IPSec
A protocol used to create secure VPNs by encrypting and authenticating all IP packets. It uses the IKE protocol for key exchange and authentication. IPsec provides security at the network layer.
L2TP
Layer 2 Tunneling protocol, a protocol for tunnelling VPN (Virtual Private Network) traffic. L2TP is an extension to the
Local Security Manager (LSM)
A
310X Family LSM User’s Guide V 2.5.1