Intel PRO/100 Computer Hardware User Manual


 
Intel® Packet Protect User’s Guide
70
DES
Data Encryption Standard. An encryption
standard used to protect data confidential-
ity by encoding the data before it travels
on a network.Packet Protect supports 56-
bit DES and 168-bit 3DES (3DES avail-
able in the United States and Canada
only).
destination workgroup
A logical collection of computers (servers
and clients) that you define in Packet Pro-
tect. Destination workgroups contain lists
of computers with which a computer in the
source workgroup may want to communi-
cate using IPSec.
Destination workgroups in Packet Protect
are different from workgroups in Windows
operating systems.
default behavior
The setting for a workgroup specified in
Packet Protect that determines how a com-
puter communicates using IPSec.
Diffie-Hellman
A method of sharing a secret key between
two computers.
DNS
Domain Name Server. The network of
Domain Name Servers that resolve fully
qualified domain names (FQDNs) to their
corresponding IP addresses.
encryption
The process of protecting data confidenti-
ality by encoding the data so it is unread-
able to anyone who doesn’t have the secret
key to decode it. You can read data if it
isn’t encrypted, but you can’t read data
while it’s encrypted.
ESP
Encapsulation Security Payload. A
method of protecting the confidentiality
and/or integrity of data. ESP can be used
to protect data confidentiality by encrypt-
ing the data using DES or 3DES. ESP can
also be used to verify the origination of
data by authenticating the data using MD5
or SHA-1.
FQDN
Fully Qualified Domain Name. The
unique name given to a computer or
device. When addressing information or
requests, it’s often easier to remember a
fully qualified domain name rather than an
IP address. Because computers communi-
cate using IP addresses, DNS software
matches the fully qualified domain name
to its corresponding IP address so users
can communicate using the domain name
and the IP address.
ICMP
Internet Control Message Protocol. A type
of IP protocol used to transmit data that
typically contains error or explanatory
information. For example, the ping com-
mand uses ICMP to transmit data about
network connectivity.
IETF
Internet Engineering Task Force. The
organization that is developing and stan-
dardizing IKE and IPSec.
IKE
Internet Key Exchange. A protocol built
on standards that is used to negotiate a
protected communication.
IKE is a subset profile of ISAKMP/Oak-
ley. It is being developed by the Internet
Engineering Task Force (IETF).
intruder
An unwanted visitor from inside or out-
side your company who may try to steal
information or harm your network.
IP
Internet Protocol. A set of rules that