TMS zl Management and Configuration Guide ST.1.0.090213

B-29
Glossary
sliding window A TCP header field that specifies the maximum number of unacknowledged
bytes allowed in a session.
slot ID The number assigned to the chassis slot.
SNMP Simple Network Management Protocol. An application-layer protocol that
supports the exchange of management information between network devices.
An SNMP network consists of agents, managed devices, and network-manage-
ment systems. Hierarchically organized information about network devices is
stored in and accessed from a MIB. The NAC 800 supports SNMPv2, which
controls access based on community. For example, a server that knows the
NAC 800’s read-only community name can read. For more information, see RFC
1157 at http://www.ietf.org/rfc/rfc1157.txt.
SNMP trap A message which is initiated by a network element and sent to the network
management system. For example, if PCM+ is configured as a trap destination,
the TMS zl Module can send SNMP traps to PCM+.
SNMP community A group that devices that run SNMPv1/v2c belong to. It helps define where
information is sent. These devices will not respond to SNMP messages that
are from other SNMP communities.
source NAT Network address translation in which the source IP address is replaced by
another IP address as the packet crosses a network boundary.
source routing A process in which a sender specifies the route by which a packet will travel.
As an attack technique, the sender specifies a route to see if the route is
successful, then learns legitimate paths from the failed and successful routing.
source zone The firewall zone from which a packet is sent.
SPF Shortest Path First. An algorithm used in OSPF to determine which route to
a destination is the fastest.
SPI Security Parameters Index. One of the three factors that identifies an SA. An
SPI identifies the session key and algorithm used to protect the data being
transported.
split brain A situation that results when two network devices — usually the members of
an HA cluster — attempt to perform the same function using the same IP
addresses, but they cannot or do not detect each other.
SSH Secure SHell. A program/network protocol that allows an end-user to log on
to another computer over a network, execute commands in the remote
machine’s OS, and move files from one machine to another. SSH provides