Netopia 6.3 User Manual

Page 153

Advertising
background image

153

Appendix B

-----M-----

magic number

Random number generated by a router and included in packets it
sends to other routers. If the router receives a packet with the same
magic number it is using, the router sends and receives packets with
new random numbers to determine if it is talking to itself.

MD5

A 128-bit, message-digest, authentication algorithm used to create
digital signatures. It computes a secure, irreversible, cryptographically
strong hash value for a document. Less secure than variant SHA-1.

metric

Distance, measured in the number of routers a packet must traverse,
that a packet must travel to go from a router to a remote network. A
route with a low metric is considered more efficient, and therefore
preferable, to a route with a high metric. See hop count.

modem

Modulator/demodulator. Device used to convert a digital signal to an
analog signal for transmission over standard telephone lines. A
modem at the other end of the connection converts the analog signal
back to a digital signal.

MRU

Maximum Receive Unit. The maximum packet size, in bytes, that a
network interface will accept.

MTU

Maximum Transmission Unit. The maximum packet size, in bytes, that
can be sent over a network interface.

MULTI-LAYER

The Open System Interconnection (OSI) model divides network traffic
into seven distinct levels, from the Physical (hardware) layer to the
Application (software) layer. Those in between are the Presentation,
Session, Transport, Network, and Data Link layers. Simple first and
second generation firewall technologies

inspect between 1 and 3 lay-

ers of the 7 layer model, while our SMLI engine inspects layers 2
through 7.

-----N-----

NAK

Negative acknowledgment. See ACK.

Name

The Name parameter refers to the name of the configured tunnel. This
is mainly used as an identifier for the administrator. The Name param-
eter is an ASCII and is limited to 31characters. The tunnel name is the
only IPSec parameter that does not need to match the peer gateway.

NCP

Network Control Protocol.

Negotiation Method

This parameter refers to the method used during the Phase I key
exchange, or IKE process. SafeHarbour supports Main or Aggressive
Mode. Main mode requires 3 two-way message exchanges while
Aggressive mode only requires 3 total message exchanges.

null modem

Cable or connection device used to connect two computing devices
directly rather than over a network.

-----P-----

packet

Logical grouping of information that includes a header and data.
Compare frame, datagram.

PAP

Password Authentication Protocol. Security protocol within the PPP
protocol suite that prevents unauthorized access to network services.
See RFC 1334 for PAP specifications. Compare CHAP.

parity

Method of checking the integrity of each character received over a
communication channel.

Peer External IP Address The Peer External IP Address is the public, or routable IP address of the

remote gateway or VPN server you are establishing the tunnel with.

Advertising