TMS zl Management and Configuration Guide ST.1.0.090213

B-30
Glossary
strong authentication. It secures communications over unsecured channels
and can be used when tunneling. For more information, see the SSH Internet
Draft at http://www.free.lp.se/fish/rfc.txt.
SSL Secure Socket Layer. Used for securing the transmission of messages over
insecure networks such as the Internet, SSL works by using asymmetric keys
to encrypt message data.
startup-config The settings that have been saved to the module’s flash memory. When the
module is booted, it reads settings from this file. See also running-config.
stateful A firewall or protocol that maintains session information for every connection
that passes through it.
stateless A firewall or protocol that does not maintain session information for connec-
tions that pass through it.
static route Routes that are manually added to the routing table.
stub area An area that receives traffic destined for its hosts, but does not pass any traffic
to another network. A stub area connects only with the normal area (back-
bone).
subject alternate
names
Names that you can specify along with a device’s CN that can identify the
device. These names are specified in a certificate request.
SYN flood A DoS attack in which the attacker sends a rapid succession of SYN (synchro-
nize) packets to the targeted system. The attack is intended to disrupt the
normal TCP three-way handshake in which a SYN packet sent by a client is
followed by a SYN-ACK (acknowledge) packet from the server, to which the
client should respond with an ACK packet. When the server does not receive
the ACK packet, its connections remain half-opened, which prevents legiti-
mate clients from making a connection.
syslog A client/server protocol that is used to send log messages from network
devices to a syslog server.
syslog server A server that receives and stores syslog messages from network devices.