TMS zl Management and Configuration Guide ST.1.1.100226
B-18
Glossary
M
main mode Main mode uses six total messages during IKE phase 1—three from both
initiator and the responder.
malware Software designed to infiltrate or damage a computer system. The term
encompasses computer viruses, worms, Trojans, spyware, and adware. In law,
malware is sometimes known as a computer contaminant. Malware is not
defective software that has a legitimate purpose but contains errors or bugs.
management-
access zone
A zone from which management access is permitted to Self. When you desig-
nate a management-access zone, the firewall automatically configures firewall
access policies for common management protocols between that zone and
Self.
management
information base
See MIB.
management port In monitor mode, physical port 2 (J2 on the circuit board), which plugs into the
host switch backplane. This port is an untagged member of the management
VLAN.
management
VLAN
In monitor mode, the VLAN over which management access is granted.
manager account An administrative account in SNMPv2 and v3 that has read-write access.
manual key
configuration
The use of manually input keys instead of IKE to authenticate the two end-
points of an IPsec VPN.
many-to-many A source NAT operation wherein a pool of NAT addresses is assigned to a
limited number of outgoing connections.
many-to-one A NAT operation whereby multiple IP addresses are assigned the same IP
address.
master The member of an HA cluster that coordinates the workload of an active-active
cluster or performs the workload of an active-backup cluster and stores the
primary configuration for the cluster.
maximum
transmission unit
See MTU.
MD5 Message-Digest algorithm 5. A hash algorithm used to create digital signatures.
MD5 is a one-way hash function that transforms and condenses data into a
fixed string of digits called a message digest. A variety of protocols use MD5