Netopia 6.3 User Manual

Page 154

Advertising
background image

154

Appendix B

Peer Internal IP Network

The Peer Internal IP Network is the private, or Local Area Network
(LAN) address of the remote gateway or VPN Server you are communi-
cating with.

Peer Internal IP Netmask The Peer Internal IP Netmask is the subnet mask of the Peer Internal IP

Network.

PFS-DH

Perfect Forward Secrecy Diffie Hellman Group. PFS forces a DH negoti-
ation during Phase II of IKE-IPSec SA exchange. You can disable this or
select a DH group 1, 2, or 5. PFS is a security principle that ensures
that any single key being compromised will permit access to only data
protected by that single key. In PFS, the key used to protect transmis-
sion of data must not be used to derive any additional keys. If the key
was derived from some other keying material, that material must not
be used to derive any more keys.

PING

Packet INternet Groper. Utility program that uses an ICMP echo mes-
sage and its reply to verify that one network node can reach another.
Often used to verify that two hosts can communicate over a network.

PPP

Point-to-Point Protocol. Provides a method for transmitting datagrams
over serial router-to-router or host-to-network connections using
synchronous or asynchronous circuits.

Pre-Shared Key

The Pre-Shared Key is a parameter used for authenticating each side.
The value can be an ASCII or Hex and a maximum of 64 characters

.

Pre-Shared Key Type

The Pre-Shared Key Type classifies the Pre-Shared Key. SafeHarbour
supports

ASCII

or

HEX

types

protocol

Formal set of rules and conventions that specify how information can
be exchanged over a network.

PSTN

Public Switched Telephone Network.

-----R-----

repeater

Device that regenerates and propagates electrical signals between two
network segments. Also known as a hub.

RFC

Request for Comment. Set of documents that specify the conventions
and standards for TCP/IP networking.

RIP

Routing Information Protocol. Protocol responsible for distributing
information about available routes and networks from one router to
another.

RJ-45

Eight-pin connector used for 10BaseT (twisted pair Ethernet) net-
works.

route

Path through a network from one node to another. A large internet-
work can have several alternate routes from a source to a destination.

routing table

Table stored in a router or other networking device that records avail-
able routes and distances for remote network destinations.

RTS

Request to Send. Circuit activated in hardware flow control when a
computer (or other DTE) is ready to transmit data to a modem (or
other DCE). See CTS, xon/xoff.

-----S-----

SA Encrypt Type

SA Encryption Type refers to the symmetric encryption type. This
encryption algorithm will be used to encrypt each data packet. SA
Encryption Type values supported include

DES

,

3DES

,

CAST

and

Blow-

fish

.

SA Hash Type

SA Hash Type refers to the Authentication Hash algorithm used during
SA negotiation. Values supported include

MD5 SHA1

. N/A will display

if NONE is chose for Auth Protocol.

Advertising