TMS zl Management and Configuration Guide ST.1.0.090213
B-28
Glossary
sequence number
out of range
When packets are received outside of the TCP sliding window's parameters.
This can be an indication of an attack.
sequence number
overflow
A condition wherein an IPsec SA exhausts all of its sequence numbers before
the session has ended.
sequence number
prediction
An attack in which the attacker guesses or sniffs a TCP session sequence
number to gain unwarranted access to a network. See ISN.
serial console A management access method that requires a serial connection between the
host switch and a workstation plus terminal-emulation software.
serial number A unique number that identifies each TMS zl Module. The serial number is
displayed on the dashboard.
services OS An underlying layer of software on which the TMS zl Module's product
software runs.The services OS is designed primarily for blade maintenance.
It is from this CLI context that you install licenses and update the module's
software.
SHA-1 Secure Hash Algorithm One. One of five cryptographic hash functions that
were designated by the National Security Agency. SHA-1 is used in TLS, SSL,
and IPsec and is considered to be a successor to MD5. For more information,
see RFC 3174 at http://www.ietf.org/rfc/rfc3174.txt.
shared secret Any authentication information such as a password that is “known” by two or
more network devices. The shared secret is identical on both devices.
signature A preset definition that specifies characteristics that are indicative of a
particular attack.
signature-based
IDS
Attack detection that compares audit data with known attack signatures that
are stored in a signature database.
signature family A grouping of signatures that detect similar kinds of attacks, for example, DoS,
XSS, backdoor, gain access, and so on.
signature server The HP ProCurve server from which the latest signature files are downloaded.
The signature server address is preloaded in the TMS zl Module and cannot
be altered.
single-entry
address object
An address object that specifies only a single IP address, IP address range, or
network address.
site-to-site A type of VPN tunnel between two VPN gateways, both of which can be initiator
and responder.