TMS zl Management and Configuration Guide ST.1.0.090213

B-34
Glossary
W
Web browser
interface
A management access method that requires an HTTPS over IP connection to
the module plus a Web browser. Firefox 2.x and later and IE 7 and later are
supported.
well-known port The port on which the IANA has assigned a protocol to run. For example, the
well-known port for HTTP is 80.
WinNuke attack An attack that is launched by sending out-of-band (OOB) data to port 139.
X
XAUTH eXtended AUTHentication. An IKE extension that permits the use of legacy
protocols such as RADIUS, SecurID, and OTP. For more information, see the
Internet Draft at http://www.vpnc.org/ietf-xauth/draft-beaulieu-ike-xauth-
02.txt.
Z
zero-day attack Any new and previously unknown attack. Zero-day attacks are especially
dangerous because no signature exists that can detect them.
zone Logical groupings of VLANs that can be created when the TMS zl Module is in
routing mode. Firewall and NAT policies govern traffic flow between zones.
The TMS zl Module has ten zones: Self, Internal, External, DMZ, Zone1, Zone2,
Zone3, Zone4, Zone5, and Zone6.
Zone<x> Zone1–Zone6. Additional zones that are intended for whatever the user needs:
additional internal VLANs, more VLANs in the DMZ, or other VLANs that
connect to untrusted networks.