ZyXEL Communications Prestige 100L manual Nic, Pap, Pbx

Models: Prestige 100L

1 121
Download 121 pages 5.3 Kb
Page 110
Image 110

 

Prestige 100L IDSL Router

 

standards, denoted as NI2 and NI3, are currently being developed.

NIC

Network Interface Card. A board that provides network communication capabilities to

 

and from a computer system. Also called an adapter.

Node

Any single computer connected to a network.

NT-1

The NT-1 (Network Termination 1) is a device that is required to connect ISDN

 

terminal equipment to an ISDN line. The NT-1 connects to the two-wire line (twisted

 

pair copper wiring) that your telephone company has assigned for your ISDN service.

 

Your ISDN service does not work if the NT-1's plug is not connected to a working

Open

electrical outlet.

Allows the system to be connected easily to devices and programs made by other

Architecture

manufacturers. Open architectures use off-the-shelf components and conform to

 

approved drafts. A system with a closed architecture, on the other hand, is one

 

whose design is proprietary making it difficult to connect the system to other systems.

Packet Filter

A filter that scans packets and decides whether to let them through.

PAP

Password Authentication Protocol (PAP) is a security protocol that requires users to

 

enter a password before accessing a secure system. The user’s name and password

 

are sent over the wire to a server, where they are compared with a database of user

 

account names and passwords. This technique is vulnerable to wiretapping

 

(eavesdropping) because the password can be captured and used by someone to

 

log onto the system.

Password

A program that uses a dictionary of words, phrases, names, etc. to guess a

Cracker

password.

Password

A system of encrypting electronic files using a single key or password. Anyone who

Encryption

knows the password can decrypt the file.

Password

The storage of a user's username and password in a network administrator

Shadowing

database.

PBX

Private Branch eXchange is a small version of the phone company's larger central

 

switching office. A PBX is a private telephone switch. It is connected to groups of

 

lines from one or more central offices and to all of the telephones at the location

Ping Attack

served by the PBX.

An attack that slows down the network until it is unusable. The attacker sends a

 

"ping" command to the network repeatedly to slow it down. See also Denial of

Pirate

Service.

Someone who steals or distributes software without paying the legitimate owner for it.

 

This category of computer criminal includes several different types of illegal activities.

 

Making copies of software for others to use. Distributing pirated software over the

 

Internet or a Bulletin Board System. Receiving or downloading illegal copies of

Pirated

software in any form.

Software that has been illegally copied, or that is being used in violation of the

Software

software's licensing agreement. Pirated software is often distributed through pirate

 

bulletin boards or on the Internet. In the internet underground it is known as Warez.

Plain Text

The opposite of Cipher Text, Plain Text is readable by anyone.

Point of

The physical point where the phone company ends its responsibility with the wiring of

Demarcation

the phone line.

Glossary

G

Page 110
Image 110
ZyXEL Communications Prestige 100L manual Nic, Pap, Pbx