Authentication exemption
Connection security rule used to specify one or more computers that do not need to be authenticated in order to pass traffic.
Authentication Header (AH)
IPSec protocol that provides authentication, integrity, and anti-replay for the entire packet.
authentication method
Security algorithm and type used for IPSec authentication and key exchange.
checksum
Mathematical value that is used to provide an integrity check for a network packet.
Connection Security Rules
Windows Firewall component that requires two peer computers to mutually authenticate before they can pass information between them.
cookie
Text files sent by a server to a Web browser, used for authenticating, tracking, and maintaining specific information about users.
default response rule
Connection security rule used to ensure that the computer responds to requests for secure communication.
dynamic rekeying
Determination of new keying material through a new Diffie-Hellman exchange that takes place on a regular basis.
Encapsulating Security Payload (ESP)
IPSec protocol that provides confidentiality (in addition to authentication, integrity, and anti-replay) for the IP payload.
exceptions
Windows Firewall configuration item that allows specifically defined traffic to traverse the firewall.
identity spoofing
Attack in which an attacker can falsify or “spoof” the identity of either the sending or receiving computer.
IPSec
Suite of protocols used to provide security for TCP/IP hosts at the Internet layer.
Isolation
Connection security rule used to restrict inbound and outbound connections.
LM Authentication
Weakest form of NTLM authentication that has been in use since the earliest days of Windows networking.
mirrored
Process by which network traffic that is defined in one direction will also be defined in the opposite direction.
NTLM Authentication
User authentication based on the NT LAN Manager authentication protocol.
NTLMv2 Authentication
Strongest form of NTLM authentication.
packet sniffer
Computer software or hardware that can intercept and monitor network traffic in real time.
quick mode negotiation
Portion of IPSec negotiation in which Security Associations are negotiated and where computers negotiate the primary protocols (AH and/or ESP), hash algorithm, and encryption algorithm to use for data transfer.
scopes
In DHCP, the portion of the TCP/IP address space that is allocated for a particular group of computers, typically on a single subnet.
Server-to-server
Connection security rule that secures traffic between two servers or two groups of servers.
transport mode
IPSec mode used to provide end-to-end security.
Tunnel
Connection security rule that secures traffic only between two tunnel endpoints and not between the actual hosts that send and receive secured traffic.
Tunnel mode
IPSec mode used to provide site-to-site communications that cross the Internet (or other public networks).

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>