ZyXEL Communications A-6000 Network Router User Manual


 
A-6000 High Speed, Long Range Ethernet Wireless Bridge
CLI commands 5-6
need to be made along the way. Permanent means that the circuit is
preprogrammed by the carrier as a path through the network. It does not need
to be set up or torn down for each session.
Reconnaissance The finding and observation of potential targets for a cracker to attack.
RFC An RFC (Request for Comments) is an Internet formal document or standard
that is the result of committee drafting and subsequent review by interested
parties. Some RFCs are informational in nature. Of those that are intended to
become Internet standards, the final version of the RFC becomes the standard
and no further comments or changes are permitted. Change can occur,
however, through subsequent RFCs.
RIP Routing Information Protocol is an interior or intra-domain routing protocol that
uses the distance-vector routing algorithms. RIP is used on the Internet and is
common in the NetWare environment as a method for exchanging routing
information between routers.
Router A device that connects two networks together. Routers monitor, direct, and filter
information that passes between these networks. Because of their location,
routers are a good place to install traffic or mail filters. Routers are also prone to
attacks because they contain a great deal of information about a network.
SAP In NetWare, the SAP (Service Advertising Protocol) broadcasts information
about available services on the network that other network devices can listen to.
A server sends out SAP messages every 60 seconds. A server also sends out
SAP messages to inform other devices that it is closing down. Workstations use
SAP to find services they need on the network.
SATAN A UNIX program that gathers information on networks and stores it in
databases. It is helpful in finding security flaws such as incorrect settings,
software bugs and poor policy decisions. It shows network services that are
running, the different types of hardware and software on the network, and other
information. It was written to help users find security flaws in their network
systems.
Server A computer, or a software package, that provides a specific kind of service to
client software running on other computers.
Set-Top Box A set-top box is a device that enables a television set to become a user
interface to the Internet and also enables a television set to receive and decode
digital television (DTV) broadcasts.
SNMP System Network Management Protocol is a popular management protocol
defined by the Internet community for TCP/IP networks. It is a communication
protocol for collecting information from devices on the network.
Snooping Passively watching a network for information that could be used to a hacker's
advantage, such as passwords. Usually done while Camping Out.
SOCKS A protocol that handles TCP traffic through proxy servers.
SPAM Unwanted e-mail, usually in the form of advertisements.
Splitter Passive devices that divide the traffic on trunk cables and send it down feeder
cables.
Spoofing To forge something, such as an IP address. IP Spoofing is a common way for
hackers to hide their location and identity
SSL (Secured
Socket Layer)
Technology that allows you to send information that only the server can read.
SSL allows servers and browsers to encrypt data as they communicate with
each other. This makes it very difficult for third parties to understand the
communications.
STP Twisted-pair cable consists of copper-core wires surrounded by an insulator.
Two wires are twisted together to form a pair, and the pair form a balanced
circuit. The twisting prevents interference problems. STP (shielded twisted-pair)
provides protection against external crosstalk.
Straight through
Ethernet cable
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar
devices, for example, a data terminal equipment (DTE) device and a data
communications equipment (DCE) device. A straight through Ethernet cable is