Netmaker Glossary

Glossary

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

A

Access Control List (ACL)

Access Control List (ACL)

An Access Control List (ACL) is a set of rules that determines who or what can access specific resources in a computer system or network.

Access Point (AP)

Access Point (AP)

An Access Point (AP) is a device that creates a wireless local area network, or WLAN, usually within an office or large building.

Access Policies

Access Policies

Access Policies are sets of rules and guidelines that control who can access specific resources, systems, or data within a network.

Active Directory (AD)

Active Directory (AD)

Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks.

Adaptive Authentication

Adaptive Authentication

Adaptive authentication is a method used to verify a user's identity and authorization levels dynamically based on a variety of contextual factors.

Adaptive Security

Adaptive Security

Adaptive Security is an advanced method of protecting systems, networks, and data by constantly assessing and adjusting to potential threats.

Allowed IPs

Allowed IPs

Allowed IPs‚ refers to a list of Internet Protocol (IP) addresses or ranges of addresses that are permitted to access a particular network or service.

Application Layer Gateway (ALG)

Application Layer Gateway (ALG)

An Application Layer Gateway (ALG) is a special type of network component that helps manage and control specific types of data traffic passing through a network.

Asynchronous Transfer Mode (ATM)

Asynchronous Transfer Mode (ATM)

Asynchronous Transfer Mode (ATM) is a technology used for data transmission in networks.

Authenticated Encryption with Associated Data (AEAD)

Authenticated Encryption with Associated Data (AEAD)

Authenticated Encryption with Associated Data (AEAD) is a form of encryption that simultaneously safeguards the confidentiality and authenticity of digital data.

Authentication

Authentication

Authentication is the process that determines if someone or something is who or what they claim to be.

B

BGP (Border Gateway Protocol)

BGP (Border Gateway Protocol)

BGP (Border Gateway Protocol) is a protocol used to exchange routing information between different networks on the internet.

Backbone Network

Backbone Network

A backbone network, also known as a core network, is a central segment of a computer network designed to interconnect various smaller subnetworks, like Local Area Networks (LANs), within a building, across different buildings, or over wide geographic areas.

Bandwidth Management

Bandwidth Management

Bandwidth management refers to the methods used to monitor and control data transmission over a network to prevent congestion and ensure smooth communication.

Bandwidth Throttling

Bandwidth Throttling

Bandwidth Throttling is a deliberate act of slowing down the internet speed within a local network by administrators.

Broadcast Domain

Broadcast Domain

A broadcast domain is a specific area within a computer network where any broadcast sent by a device can be received by all other devices in that same area.

Broadcast Storm

Broadcast Storm

A broadcast storm occurs when there is an overwhelming amount of broadcast and multicast traffic on a computer network.

Bypass Firewall Rules

Bypass Firewall Rules

Bypass Firewall Rules refers to the techniques or methods used to evade the restrictions and controls imposed by a firewall in a network.

C

CIDR (Classless Inter-Domain Routing)

CIDR (Classless Inter-Domain Routing)

CIDR (Classless Inter-Domain Routing) is a method used for allocating IP addresses and for IP routing.

Caching Proxy

Caching Proxy

A caching proxy is a server that acts as an intermediary between a user and a web server, designed to store copies of frequently accessed web content.

Carrier Ethernet

Carrier Ethernet

Carrier Ethernet refers to a set of technologies and services that extend the well-known Ethernet framework, typically used in local area networks (LANs), to the larger-scale networks operated by telecommunications companies.

Cat5e/Cat6 Cable

Cat5e/Cat6 Cable

Cat5e (Category 5 Enhanced) and Cat6 (Category 6) cables are types of Ethernet cables used to connect network devices such as computers, routers, and switches.

Certificate Authority (CA)

Certificate Authority (CA)

A Certificate Authority (CA) is an essential part of internet security, acting as a trusted third party that issues digital certificates.

ChaCha20 Encryption

ChaCha20 Encryption

ChaCha20 Encryption is a high-speed stream cipher that provides strong security measures for digital communications.

Circuit Switching

Circuit Switching

Circuit switching is a telecommunications method where a dedicated communication path or circuit is established between two network nodes before they start exchanging data.

Client-Server Model

Client-Server Model

The Client-Server Model is a way to design computer networks that separates tasks between two types of computers: clients and servers.

Cloud Gateway

Cloud Gateway

A Cloud Gateway is a networking component designed to facilitate secure communication between devices in a local network and cloud-based services or resources.

Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM) is a set of tools and practices designed to improve the security of cloud environments.

Cloud VPN

Cloud VPN

A Cloud VPN, also known as a Virtual Private Network as a Service (VPNaaS), is a type of VPN that offers a secure and encrypted connection over the Internet from a device to a network, utilizing cloud-based network infrastructure.

Coaxial Cable

Coaxial Cable

A coaxial cable, commonly known as a coax cable, is a type of electrical cable designed to carry high-frequency signals with minimal signal loss.

Collision Domain

Collision Domain

A Collision Domain is a specific segment of a computer network where data packets can collide with one another when being sent over the network.

Connection Aggregation

Connection Aggregation

Connection aggregation is a term that refers to the process of combining multiple network connections into a single, more robust and efficient connection.

Connection Handshake

Connection Handshake

A "Connection Handshake" is a process used in networking to establish a secure and efficient connection between two devices or systems.

Connection Tracking

Connection Tracking

Connection tracking is a method used by security systems to monitor and manage network connections.

Contextual Access

Contextual Access

Contextual Access refers to a security approach where the access to information or resources within a network is granted based on various situational factors rather than just static credentials like usernames and passwords.

Control Plane

Control Plane

The control plane is a crucial part of a computer network that manages how data is routed, processed, and controlled across the system.

Cryptographic Agility

Cryptographic Agility

Cryptographic agility refers to the capability of cryptographic systems to interchange multiple cryptographic algorithms and primitives without requiring major changes to the existing infrastructure.

Cryptographic Binding

Cryptographic Binding

Cryptographic Binding is a technique used to ensure that two pieces of data are securely linked together using cryptographic methods.

Cryptographic Protocols

Cryptographic Protocols

Cryptographic protocols are sets of rules that use mathematical techniques to help secure digital communication and data exchange between parties.

Cryptokey Routing

Cryptokey Routing

Cryptokey Routing is a core concept within the WireGuard VPN framework that serves as a unique approach to managing network traffic through encrypted tunnels.

D

DDoS (Distributed Denial of Service)

DDoS (Distributed Denial of Service)

A DDoS (Distributed Denial of Service) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic.

DHCP (Dynamic Host Configuration Protocol)

DHCP (Dynamic Host Configuration Protocol)

DHCP, short for Dynamic Host Configuration Protocol, is an essential networking protocol used within various types of networks to automatically assign IP addresses and other network configurations to devices, thereby enabling them to communicate effectively over the network.

DHCP Relay

DHCP Relay

DHCP Relay is a network service that helps manage the process of assigning IP addresses to devices on different subnets.

DNS (Domain Name System)

DNS (Domain Name System)

DNS stands for Domain Name System, a core component of the internet that translates human-friendly domain names like "netmaker.

DNS Spoofing

DNS Spoofing

DNS Spoofing, also known as DNS cache poisoning, is a type of cyberattack where an attacker corrupts the data stored in a DNS (Domain Name System) resolver's cache.

Data Encapsulation

Data Encapsulation

Data encapsulation is a fundamental concept in networking that refers to the technique of wrapping data and the methods that operate on that data within a single unit.

Datagram Transport Layer Security (DTLS)

Datagram Transport Layer Security (DTLS)

Datagram Transport Layer Security (DTLS) is a communications protocol designed to provide secure data transmission between devices over the Internet.

Decryption

Decryption

Decryption is the process of converting encoded or encrypted data back into its original form so that it can be understood.

Deep Packet Inspection (DPI)

Deep Packet Inspection (DPI)

Deep Packet Inspection (DPI) is a sophisticated method used in network security to examine the data that travels across networks.

Demilitarized Zone (DMZ)

Demilitarized Zone (DMZ)

A Demilitarized Zone (DMZ) in computer networking is a physical or logical subnetwork that separates an internal local area network (LAN) from other untrusted networks, typically the internet.

Device Posture

Device Posture

Device Posture refers to the overall security status and compliance of a device, such as a computer, smartphone, or tablet, concerning an organization's security policies.

Device Provisioning Protocol (DPP)

Device Provisioning Protocol (DPP)

The Device Provisioning Protocol (DPP) is a modern, secure method designed to simplify the process of connecting devices to Wi-Fi networks, especially focusing on Internet of Things (IoT) devices that often have limited or no user interfaces.

Domain Controller

Domain Controller

A domain controller (DC) is a crucial server in a computer network that handles security authentication requests.

Dual Stack

Dual Stack

Dual Stack is a networking technology that allows a device to support both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) simultaneously.

Dynamic IP Management

Dynamic IP Management

Dynamic IP Management refers to the process of automatically assigning and managing IP addresses from a pool of available addresses to devices on a network.

Dynamic Multipoint VPN (DMVPN)

Dynamic Multipoint VPN (DMVPN)

Dynamic Multipoint VPN (DMVPN) is a secure and dynamic network platform designed to simplify the creation of large-scale virtual private networks (VPNs).

Dynamic Routing

Dynamic Routing

Dynamic routing is a process used in computer networks to ensure data packets find the best path to their destination.

Dynamic Trust Evaluation

Dynamic Trust Evaluation

Dynamic Trust Evaluation is a method used in computer networks and cybersecurity to continually assess and validate the trustworthiness of devices, users, and systems.

E

EAP (Extensible Authentication Protocol)

EAP (Extensible Authentication Protocol)

EAP (Extensible Authentication Protocol) is a framework used in computer networks to provide a flexible way for various authentication methods.

Edge Device

Edge Device

An edge device is a type of hardware that serves as a connection point between different networks or between a network and the internet.

Egress

Encapsulated Security Payload (ESP)

Encapsulated Security Payload (ESP)

Encapsulated Security Payload (ESP) is a security protocol used to provide confidentiality, as well as optional integrity, authentication, and replay protection for data communications over an IP network.

Encryption

Encryption

Encryption is a method of protecting data by transforming it into a format that cannot be easily understood by unauthorized individuals.

Endpoint

Endpoint

Endpoint refers to any device or node that serves as an entry or exit point within a network, through which communication channels are established.

Endpoint Compliance

Endpoint Compliance

Endpoint compliance refers to the practice of ensuring that all endpoint devices within a network adhere to the required security configurations and standards.

Endpoint Protection Platform (EPP)

Endpoint Protection Platform (EPP)

An Endpoint Protection Platform (EPP) is a comprehensive cybersecurity solution designed to safeguard the devices connected to an organization's network.

Endpoint Security

Endpoint Security

Endpoint security refers to safeguarding endpoints or entry points of end-user devices like desktop computers, laptops, mobile devices, and even IoT (Internet of Things) devices from cyber threats.

Endpoint Verification

Endpoint Verification

Endpoint Verification is a security process used to ensure that devices connecting to a network or service meet certain predefined security criteria before they're allowed access.

Ethernet

Ethernet

Ethernet is a widely used technology for connecting computers and other devices in a local area network (LAN).

Ethernet Frame

Ethernet Frame

An Ethernet frame is a structured package of data used for communication in a local area network (LAN).

F

Failover

Failover

Failover is the process of automatically switching to a standby or redundant computer server, system, hardware component, or network if the active one fails or experiences an abnormal termination.

Fast Retransmit

Fast Retransmit

Fast Retransmit is a fundamental term in the field of computer networking, specifically within the context of the Transmission Control Protocol (TCP), which is widely used for transferring data across the internet and other networks.

Fiber Optic Cable

Fiber Optic Cable

Fiber optic cables are a type of cable that uses light to send data.

Firewall

Firewall

A firewall is a network security tool that acts as a barrier between an internal, secured network and external, untrusted networks such as the internet.

Firewall Rules

Firewall Rules

Firewall rules are a set of instructions used to control access to a network by allowing or blocking incoming and outgoing traffic.

Forward Secrecy

Forward Secrecy

Forward secrecy, often known as perfect forward secrecy (PFS), is a security feature of certain key agreement protocols that ensures a session's encryption keys cannot be compromised even if the private key of the server is compromised in the future.

Full Tunneling

Full Tunneling

Full Tunneling is a networking concept often utilized within the framework of Virtual Private Networks (VPNs) to enhance privacy and security across internet connections.

G

GRE Tunneling (Generic Routing Encapsulation)

GRE Tunneling (Generic Routing Encapsulation)

GRE Tunneling, or Generic Routing Encapsulation, is a network protocol designed to encapsulate a wide variety of network layer protocols inside virtual point-to-point links or tunnel interfaces over an Internet Protocol network.

Gateway

Gateway

A gateway is a key network device that acts as a bridge between different networks, allowing data to flow back and forth.

Gateway Load Balancer

Gateway Load Balancer

A Gateway Load Balancer (GWLB) is a powerful tool that helps manage and route traffic through virtual appliances in a cloud environment, such as firewalls, intrusion detection systems, and inspection systems.

H

HMAC (Hash-Based Message Authentication Code)

HMAC (Hash-Based Message Authentication Code)

HMAC, short for Hash-Based Message Authentication Code, is a specific technique used in computer science to ensure both the integrity and the authenticity of a message between two parties.

Handshake

Handshake

Handshake refers to a process used in networking and telecommunications where two devices or systems establish a connection, agree on communication parameters, and confirm that they can start exchanging information.

Handshake Initiation

Handshake Initiation

Handshake initiation refers to the process of starting a secure and authenticated connection between two devices or systems over a network.

Host

Host

A "Host" in networking refers to any device or computer that connects to a network and can communicate with other devices on that network.

Hot Standby Router Protocol (HSRP)

Hot Standby Router Protocol (HSRP)

Hot Standby Router Protocol (HSRP) is a network protocol developed by Cisco to ensure high availability and reliability in IP networks.

Hybrid VPN

Hybrid VPN

A Hybrid VPN is a type of networking solution that blends the features of traditional Virtual Private Network (VPN) technology with other networking methods to provide enhanced flexibility, scalability, and security for data transmission across the internet.

I

IEEE 802.11

IEEE 802.11

IEEE 802.11 is a set of standards that define how wireless local area networks (WLANs) operate.

IKEv2 (Internet Key Exchange version 2)

IKEv2 (Internet Key Exchange version 2)

IKEv2, short for Internet Key Exchange version 2, is an updated protocol designed to ensure secure key exchange over the internet.

IP Addressing

IP Addressing

In the world of interconnected devices, IP Addressing stands as a fundamental concept that ensures every device communicating over a network can be uniquely identified and reached.

IP Whitelisting

IP Whitelisting

IP whitelisting is a security measure used to control access to a network, system, or specific services by allowing only pre-approved IP addresses to connect.

IPsec (Internet Protocol Security)

IPsec (Internet Protocol Security)

IPsec (Internet Protocol Security) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks through the use of cryptographic security services.
Star us on GitHub
Can we use Cookies?  (see  Privacy Policy).