access control list. Limits and controls who uses a host system or applications through communications link.
Screen in a high availability cluster that is keeping state and passing traffic. There is always exactly one active Screen in a correctly operating high availability cluster. See primary Screen and passive Screen.
In networking, a unique code that identifies a node to the network. SunScreen EFS uses IP addresses.
Algorithm Discovery Protocol. Enables one entity to inform another of the capabilities it supports.
Authentication Header. A mechanism for providing strong integrity and authentication for IP datagrams.
Sequence of steps designed to solve a problem or execute a process such as drawing a curve from a set of control points, or encrypting a block of data.
Authentication Management Infrastructure.
The Sun(TM) online documentation for use with the OpenWindows(TM) environment. See also online documentation.
application program interface. Set of calling conventions defining how a service is invoked through a software package. An interface between the operating system and application programs, which includes the way the application programs communicate with the operating system, and the services the operating system makes available to the programs.
A program written in the Java(TM) programming language to run within the HotJava(TM) browser, the World Wide Web (WWW) browser.
Item of information following a command. It may, for example, modify the command or identify a file to be affected.
asynchronous transfer mode. Transmits data, voice, video, and frame relay traffic in real time. With ATM, digital information is broken up into standard-sized packets, each with the address of its final destination.
Attempted cryptanalysis or an attempt to compromise system security.
Property of knowing that the claimed sender is in fact the actual sender.
Groups of consecutive bits (or bytes). In the Java(TM) programming language, any code between matching braces ({ and }).
Encryption algorithm that encrypts blocks. See stream ciphers.
The shell used by the standard Bell Labs UNIX\256 developed by Steve Bourne in 1979.
Packet delivery system, where a copy of a given packet is distributed to all hosts attached to the network.
One-choice element of a control area or a menu that starts an activity. Buttons execute commands (command buttons), display pop-up windows (window buttons) or a dialog box, and display menus (menu buttons).
See Certification Authority.
Buffer of high-speed memory used to store frequently accessed memory or values. A cache increases effective memory transfer rates and processor speed.
Cipher Block Chaining (see also DES). A mode used to chain a feedback mechanism, which essentially means the previous block is used to modify the encryption of the next block.
Certificate Discovery Protocol. Request and response protocol used by two parties to transfer certificates.
compact disk, read only memory. Storage medium that uses laser optics rather than magnetic capability to read data.
Multiple secondary Screens that are managed by the Centralized Management group's primary Screen. Note that a Screen in a centrally managed group, whether primary or secondary, can also be part of a HA cluster. See HA cluster.
Data structure that binds the identity of an entity with a public-key value.
Generic naming scheme term used to identify a particular self-generated or issued certificate. It effectively decouples the identification of a key for purposes of key lookup and access control from issues of network topology, routing, and IP addresses.
Trusted network entity that digitally signs a certificate containing information identifying the user; such as, user's name, issued certificate, and the certificate's expiration date.
Cipher Feedback. Uses a block cipher (such as DES) to implement a stream cipher.
Cryptographic algorithm used for encryption or decryption.
Encrypted message.
Screens in a HA cluster connected by a high-speed network that work together as if they were one Screen. See high availability.
Instruction to the computer. A command typically is a character string typed at a keyboard and is interpreted by the computer as a demand for a particular action. In a graphical user interface (GUI), a button, menu item, or control.
Button used to execute application commands.
Data objects that are relevant to all SunScreen EFS 3.0 policies. They include: address, screen, state engine, service, interface, certificate, time, policy, and virtual VPN gateway groups.
Translation program that converts a high-level computer language into machine language.
Join together sequentially. The UNIX\256 cat command, for example, concatenates files.
Property of communicating such that only the sender and the intended recipients know what is being sent, and unintended parties cannot determine what is sent.
Union of one policy with the common objects to form a complete description of the behavior of one or more Screens.
Practice of allowing or disallowing traffic based on the content of the data being sent.
Object in a menu that is used to perform an action.
General mechanism that server side connections can use to store and retrieve information on the client side of the connection. That is, cookies are small data files written to the hard drive by some Web sites when viewed in a Web browser. These data files contain information the site can use to track such things as passwords, lists of pages visited, and the date when a certain page was last looked at. The term cookie originated from "fortune cookie" because it sends a different message, or "fortune," each time used.
Art and science of breaking cryptographic algorithms and protocols.
Algorithm used to keep data secure.
Standard shell provided with Berkeley standard versions of UNIX\256.
UNIX\256 process that runs in the background to perform a task on behalf of the system.
Application of an algorithm to reduce the space required to store or the bandwidth required to transmit data.
In a packet-switching network, a message and associated Internet source and destination addresses.
Facility that takes data that has been encoded, or compressed, by an encoder and decodes or decompresses it.
Process of converting ciphertext back to plaintext.
Small protected inside network or subnetwork that provides limited public access to resources such as Web servers, FTP servers, and other information resources.
Data Encryption Standard. A commonly used algorithm developed by IBM for the U.S. National Bureau of Standards for encrypting and decrypting data. See CBC.
See DH.
Diffie-Hellman. Named after its inventors, DH is a classic cryptographic construction that uses exponentiations over a prime field.
Sixteen-byte MD5 hash of an electronic document that allows the recipient to verify the integrity of the document and the identity of the sender.
3.5-inch removable storage medium supported by some Sun systems.
See demilitarized zone.
distinguished name. Numeric string representation of a list of IP addresses or equivalent identifier for principals in the network, such as IP nodes or users.
domain naming system. Distributed name and address mechanism used in the Internet.
Digital Signature Algorithm. Each DSA is responsible for the directory information for a single organization or organizational unit.
Destination addresses.
Process of examining traffic to be either allowed or denied.
NAT converts a set of internal private addresses into external public addresses. It allows internal hosts to contact external hosts, but cannot be used to allow external hosts to contact internal hosts.
Encrypting Firewall System.
Technique used by layered protocols in which a layer adds header information to the protocol data unit from the layer above. In Internet terminology, for example, a packet would contain a header from the physical layer, followed by a header from the network layer (IP), followed by a header from the transport layer (TCP), followed by the application protocol data. See tunnel mode.
Process of protecting information from unauthorized use by making the information unintelligible. Encryption is based on a code, called a key, which is used to decrypt the information. Contrast with decryption.
In International Organization for Standardization's open systems interconnection (OSI), a layer protocol machine. An entity within a layer accesses the layer entity below and provides services locally to the layer entity above.
Encapsulating Security Payload. Mechanism for providing integrity and confidentiality to IP datagrams. In some circumstances it can also provide authentication to IP datagrams, depending on which algorithm or algorithm mode is used. It does not provide nonrepudiation and protection from traffic analysis.
LAN that enables real-time communication between machines connected directly through cables.
Version of the SunScreen SKIP certificate software that uses 1024-bit keys and allows users to select DES, RC2, or RC4 for traffic encryption. Compare global and U.S. and Canada use only.
Process by which a passive Screen in a high availability group takes over for the active Screen if the active Screen fails or becomes unavailable.
Fiber Distributed Data Interface. High-speed networking standard. The underlying medium is fiber optics, and the topology is a dual-attached, counter-rotating token ring. FDDI networks can often be identified by the orange fiber "cable."
Program that reads the standard input, acts on it in some way, and then prints the results as standard output.
Computer situated between your internal network and the rest of the network that filters packets as they go by according to user-specified criteria.
Process of dividing a packet into multiple smaller packets so that they can be sent over a communication link that only supports a smaller size.
Command used to copy files.
File Transfer Protocol. An interactive file transfer protocol often used on TCP/IP networks to copy files to and from remote computers. Requires users to log in to the remote computer.
Can be configured to allow or deny specific FTP commands such as PUT or GET.
indication of systems that translate from one native format to another. Transfers and converts information to a receiving network. See VPN.
Graphics Interchange Format. A format for compressing bitmap files to define how the computer accesses and draws files. See jpeg and tiff.
Version of the SunScreen SKIP certificate software that uses 512-bit keys and allows users to select RC2 or RC4 for traffic encryption. Compare export controlled and U.S. and Canada use only.
Provides the user with a method of interacting with the computer and its special applications, usually with a mouse or other selection device.
See graphical user interface.
See high availability.
High availability-specific groups. Multiple secondary HA cluster Screens are managed by the primary HA cluster Screen. One Screen in an HA cluster (secondary or primary) is the active Screen that is actively filtering. Additional HA cluster Screens remain passive until one detects the failure of the active HA cluster Screen and takes over the routing and filtering of the network traffic. See high availability.
Message digest or cryptographic checksum.
File of information, identified at the beginning of the program, that contains the definitions of data types and variables used by the functions in the program.
A periodic message sent between the two membership monitors t each other. Lack of a heartbeat after a specified interval and number of retries can trigger a takeover. See high availability.
Consists of one active Screen and at least one passive Screen. If the active Screen fails, a passive Screen takes over the filtering of the network traffic and other functionality of the failed firewall.
Name of any device on a TCP/IP network that has an IP address. In SunScreen EFS 3.0, host is only used when referring to a source or destination of a packet of the network traffic being discussed.
Hypertext Markup Language. A file format, based on SGML, for hypertext documents on the Internet.
Hypertext Transfer Protocol. Internet protocol that fetches hypertext objects from remote hosts. See URL.
Can be configured to allow or deny Java applets, and Active-X controls and cookies.
Internet Control Message Protocol. IP protocol that handles errors and control messages, to enable routers to inform other routers (or hosts) of IP routing problems or make suggestions of better routes. See ping.
On-screen graphic symbol that simplifies access to a program, command, or data file. Displaying objects as icons conserves screen real estate while keeping the window available for easy access.
International Data Encryption Algorithm. Used to make a message impossible for others to read.
Institute of Electrical and Electronics Engineers. The group that produced the standards for Ethernet and Token Ring.
Describes the physical interface ports of Screen objects.
When installing SunScreen EFS, the user creates, compiles, and activates a configuration named "Initial," which enables a user to connect to the SunScreen EFS Screen where the configurations used to implement their security policy are built.
Property of ensuring that data is transmitted from the source to destination without undetected alteration.
International standards-setting organization whose mandate is to foster trade between countries.
Suite of protocols within TCP/IP used to link networks worldwide, developed by the United States Department of Defense and is used on the Internet. Note that this protocol suite was developed for the ARPANET, forerunner of the Internet. The prominent feature of this suite is the IP protocol. See IP.
Internet Protocol. Network layer protocol for the Internet Protocol suite.
Integrated Services Digital Network. Worldwide digital communications network.
See International Organization for Standardization.
Internet service provider. A company providing an Internet package. This often includes a phone number access code, username, and software--all for a provider fee.
Certificate that is issued by a Certification Authority. See self-generated certificate.
Independent software vendor. Third-party software developer.
Object-oriented, platform independent programming language developed by Sun Microsystems to solve a number of problems in modern programming practice. The Java language is used extensively within the HotJavaTM browser.
Java Development Kit. Software tools used to write Java applets or application programs.
Joint Photographic Experts Group. A format for compressing bitmap files to define how the computer accesses and draws files. See gif and tiff.
Java Runtime Environment.
Core system support software group used to manage the hardware and supply basic services.
Code for encrypting or decrypting data.
Medium that contains the private key and certificate, and should be kept secure. The identifier for the certificate is on the label.
Facility in SunScreen EFS GUI that enables the display and printing of log messages.
Message Authentication Code. (Also known as media access control, an IEEE standard.) See authentication.
UNIX online documentation.
Message Digest. Authentication code that cryptographically guarantees that data has not been forged or tampered with.
Message digest one-way hash function designed by Ron Rivest. The algorithm produces a 128-bit hash, or message digest, of the input message.
List of application options.
Multiple-choice control that has a menu mark and is used to display a menu.
Hollow triangle in the border of a button or following a menu item that has a submenu attached to it. The triangle points to where the menu or submenu is displayed.
Management Information Base. SNMP structure that describes the particular device being monitored. See SNMP.
Message Integrity Check.
Arithmetic operation used in programming whose result is the remainder of a division operation.
Special form of broadcast where copies of the packet are delivered to only a subset of all possible destinations.
See network address translation.
See Network Computer.
Hardware connecting various systems, enabling them to communicate.
Function used when packets passing through a firewall have their addresses changed (or translated) to different network addresses. Address translation can be used to translate unregistered addresses into a smaller set of registered addresses, thus allowing internal systems with unregistered addresses to access systems on the Internet.
Person who maintains a network.
Connected to a network through its hardware and software.
Third of the seven layers in the ISO model for standardizing computer-to-computer communications. See ISO.
Number used by software to separate the local subnet address from the rest of a given IP address.
Network file system. A Sun distributed file system that enables a set of computers to cooperatively access each others files in a transparent manner.
SunOS(TM) 4.x network information service. NIS+ is a newer version, SunOS 5.x, with enhanced security.
Junction at which subsidiary parts originate or center.
Name by which the system is known to a communications network. Every system running Solaris is assigned a nodename. The nodename can be displayed using the Solaris uname -n command. Each Screen has a name that is normally the same as the nodename.
Property of a receiver being able to prove that the sender of a message did in fact send the message, even though the sender might later want to deny ever having sent it.
National Security Agency. United States of America's official cryptographic organization.
Name space identifier. Used to identify a naming scheme for a key. See key.
On-Line Transaction Processing. Handles real-time transactions.
Cryptographically secure hash function that cannot be reversed. See MD5, SHA, hash.
Open Systems Interconnection. Suite of protocols and standards sponsored by ISO to communicate data between incompatible computer systems.
Open shortest path first. A network routing protocol.
Group of information in a fixed format that is transmitted as a unit over communications lines.
To advance text displayed in a window by one full screen at a time, usually using a scroll bar.
Screen in a high availability cluster that is keeping state with the active Screen but not actually passing traffic. A passive Screen will become active if the cluster's active Screen fails. See active Screen.
Collection of characters used in a similar manner to, although longer than, password. Letters in both uppercase and lowercase can be used, as well as special characters and numbers. See password.
Unique string of characters that a user types as an identification code as a security measure to restrict access to computer systems and sensitive files.
Any functional unit in the same layer as another entity.
Packet Filtering Language. Packet filter used by SunScreen EFS.
Perfect Forward Secrecy. Captured packets that are decrypted cannot be used to decrypt other packets.
Pretty Good Privacy. Public-domain email encryption program that uses IDEA for data encryption, RSA for key management, and MD5 as a one-way hash function. See RSA, and MD5.
process identification number. Unique, system-wide, identification number assigned to a process.
Packet Internet Groper. Program used to test reachability of destinations by sending them an ICMP echo request and waiting for a reply. See ICMP.
Unencrypted message.
To install and configure a network interface.
PPP (the successor to SLIP) provides router-to-router and host-to-network connections over both synchronous and asynchronous circuits. Used for TCP/IP connectivity, usually for PCs over a telephone line.
Named set of policy data. For example, when the SunScreen EFS 3.0 software is first installed, there is one policy, named "Initial."
Rules that define a security policy in terms of the common data objects for SunScreen EFS 3.0. Policy data include filtering rules, NAT rules, and administration access rules.
Rules that pertain to a centralized managed group or an HA cluster. See Screen-specific rules.
Window that displays to perform a specific function and then is dismissed.
Portable Operating System Interface for Computer Environments. A set of standards that define the applications interface to basic system services for input/output, file system access, and process management, using the C programming language, which establishes standard semantics and syntax.
See Point-to-Point Protocol.
In a high availability cluster, the Screen that controls the configuration of the cluster. In a centralized management group, the Screen that controls the configuration of the other Screens in the group. Each high availability cluster or centralized management group has exactly one primary Screen. See high availability.
Corresponds to a public key and is never disclosed to the public. See secret key.
A formal description of messages to be exchanged and rules to be followed for two or more systems to exchange information.
Proxies are separate user-level applications and provide content filtering and user authentication. Proxies are used to control the content of various network services. See HTTP proxy, FTP proxy, Telnet proxy, and SMTP proxy.
Pseudo-random numbers appear random but can be generated reliably on different systems or at different times.
Medium that contains only the certificate containing the public key. The identifier for the certificate is on the label
A data structure containing a user's public key, as well as information about the time and date during which the certificate is valid.
Also known as asymmetric key cryptography. In public-key cryptosystems, everyone has two related complementary keys, a publicly revealed key and a secret key (also frequently called a private key). Each key unlocks the code that the other key makes. Knowing the public key does not help you deduce the corresponding secret key. The public key can be published and widely disseminated across a communications network. This protocol provides privacy without the need for the secure channels that a conventional cryptosystem requires.
Process for extracting particular data.
To stop in an orderly manner; to execute the normal shutdown of a program and return control to the operating system.
Variable-key-size encryption algorithms designed by Ron Rivest. RC2 is a variable-key-size block cipher, designed to be a replacement for DES. RC4 is a variable-key-size stream cipher that is stated to be ten times faster than DES. Both algorithms are quite compact, and their speed is independent of the key's size. See DES.
Globally exportable encryption algorithms from RSA, Inc., that use 40-bit keys.
Event or system that must receive a response to some stimulus within a narrow, predictable time frame, provided that the response is not strongly dependent on highly variable system-performance parameters, such as a processor load or interface.
System in another location that can be accessed through a network.
Reduced Instruction-Set computer. A central processing unit technology used by Sun Microsystems, Inc.
SunOS user name that grants special privileges to the person who logs in with that ID. The user who can supply the correct password for the root user name is given superuser privileges for the particular machine.
Intermediary device responsible for making decisions about which of several paths network (or Internet) traffic will follow.
Routing-mode interfaces have IP addresses and perform IP routing. Routing mode requires that you sub-net the network.
All proxies are accessed through the transmission control protocol (TCP), and therefore can only run on systems with at least one interface configured in routing mode.
Popular public-key algorithm, which was named after its three inventors, Ron Rivest, Adi Shamir, and Leonard Adleman.
Data objects relevant to the policies of one Screen. See common objects.
Secure Data Network Service.
Sun Directory Services.
Screen that receives its configuration from a primary Screen. Normally, no administration is performed on a secondary Screen. A secondary Screen does, however, maintain its own logs and status, which can be examined. See high availability.
Corresponds to a public key and is never disclosed to the public. See private key.
Set of security information relating to a given network connection or set of connections.
Public key value only used when entities are named using the message digest of their public value, and these names are securely communicated. See issued certificate.
Common cryptographic technique to encrypt each individual conversation between two people with a separate key.
Secure Electronic Transaction. Protocol that is an emerging standard for Internet bank card transactions.
Standard Generalized Markup Language. Method of tagging a document to apply to many format elements.
Secure Hash Algorithm. Used to verify a digital signature.
Also known as symmetric key cryptography. Cryptography where each party must have the same key to encrypt or decrypt ciphertext.
Program within which a user communicates with the operating system.
Simple Key-Management for Internet Protocols. IP-layer encryption package integrated into SunScreen EFS, which provides a system with the ability to encrypt any protocol within the TCP/IP suite efficiently. Once installed, systems running SKIP can encrypt all traffic to any SKIP-enabled product, including SunScreen products.
Simple Mail Transfer Protocol. Used on the Internet to route email.
TCP/IP protocol that sends messages from one computer to another on a network and is used on the Internet to route email.
Simple Network Management Protocol. Network management protocol that enables a user to monitor and configure network hosts remotely.
Sun Microsystems, Inc. UNIX utility that captures packets from the network and displays their contents.
Uncompiled version of a program written in a language such as C or Pascal. The source code must be translated to machine language by a program known as the compiler before the computer can execute the program.
Electronic equivalent of junk mail.
Scalable Processor Architecture. An architecture for a family of RISC processors. See RISC.
Also called a metacharacter, is a character having a special meaning to UNIX. For example, the UNIX shell interprets the ? character to stand for any single character.
structured query language. International standard language for defining and accessing relational databases.
List constructed and maintained so that the next item to be retrieved and removed is the most recently stored item still in the list.
Packet filter that bases its decision to allow or deny the packet using both the data in the packet and information (that is, state) saved from previous packets or events. A stateful packet filter has memory of past events and packets.
Packet filter that bases its decision to allow or deny a packet using only the data in that packet. A stateless packet filter has no memory of past events and packets.
Address translation that provides fixed translation between an external address and a private (possibly illegal) address. It provides a way for external hosts to initiate connections to internal hosts without actually using an external address. See NAT.
Stealth-mode offers optional hardening of the OS, which removes packages and files from the Solaris operating system that are not used by SunScreen EFS 3.0. Stealth-mode requires the Screen to partition a single network.
Symmetric algorithm that operates on plaintext a single bit (or byte) at a time. See block cipher.
Menu that displays additional choices displayed through a menu item on a menu.
Working scheme that divides a single logical network into smaller physical networks to simplify routing.
Specifies which bits of the 32-bit IP address represent network information. The subnet mask, like an IP address, is a 32-bit binary number: a 1 is entered in each position that will be used for network information and a 0 is entered in each position that will be used as node number information. See node.
Certification authority operated by Sun Microsystems, Inc. that issues Export-Controlled (1024-bit) certificates.
Certification authority operated by Sun Microsystems, Inc. that issues Global (512-bit) certificates.
Name of the family of security products produced by Sun Microsystems, Inc.
Special user who has privileges to perform all administrative tasks on the system. Also known as root.
See shared-key cryptography.
See transmission control protocol.
Transmission Control Protocol/Internet Protocol. Protocol suite originally developed for the Internet. It is also called the Internet protocol suite. SunOS networks run on TCP/IP by default.
Virtual terminal protocol in the Internet suite of protocols. Enables users of one host to log in to a remote host and interact as normal terminal users of that host.
Enables users of one host to log into a remote host and interact as normal terminal users of that host.
Also called triple-DES. Indicates that encryption is performed on a block three times with two keys: beginning with the first key, then with the second key, and finally with the first key again. See DES and EDE.
Tagged Image File Format. A format for compressing bitmap files to define how the computer accesses and draws files. See gif and jpeg.
Data object or message that describes the current state of the network.
LAN formed in a closed loop topology to regulate online traffic.
Analysis of network traffic flow for the purpose of deducing information such as frequency of transmission, the identities of the conversing parties, sizes of packets, flow identifiers used, and the like.
Process of encrypting an entire IP packet, and wrapping it in another (unencrypted) IP packet. The source and destination addresses on the inner and outer packets may be different.
Destination address on the outer (unencrypted) IP packet to which tunnel packets are sent. Generally used for encrypted gateways where the IP address of the host serves as the intermediary for any or all hosts on a network whose topography must remain unknown or hidden from the rest of the world.
Unsigned Diffie-Hellman. UDH public value can be used when entities are named using the message digest of their DH public value, and these names are securely communicated. See certificate Identifier (ID).
User Datagram Protocol. All CDP communication uses UDP.
Packet sent to a single destination. Compare broadcast, multicast.
Operating system originally developed at AT&T Bell Laboratories by Ken Thompson and Dennis Ritchie in 1969.
Uniform Resource Locator. A code that searches for the location of a specific address on the Internet.
Version of the SunScreen SKIP certificate software that uses 2048-bit keys and allows users to select 3DES, IDEA, and so forth, for traffic encryption. Compare export controlled and global.
Manner in which a policy's historical versions are preserved.
Name by which a user is known to the system.
A network with the appearance and functionality of a regular network, but which is really like a private network within a public one.
The use of encryption in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically the Internet. VPNs are generally cheaper than real private networks using private lines but rely on having the same encryption system at both ends. The encryption may be performed by firewall software or possibly by routers.
See Virtual Private Network.
See Virtual Private Network.
See World Wide Web.
Document on the Web.
Network of servers on the Internet with one or more home pages that provide information and can include hypertext links to other documents on that server and often other servers as well.
Button used to display a window containing additional controls. See Button.