TMS zl Management and Configuration Guide ST.1.1.100226

B-29
Glossary
source zone The firewall zone from which a packet is sent.
SPF Shortest Path First. An algorithm used in OSPF to determine which route to
a destination is the fastest.
SPI Security Parameters Index. One of the three factors that identifies an SA. An
SPI identifies the session key and algorithm used to protect the data being
transported.
split brain A situation that results when two network devices — usually the members of
an HA cluster — attempt to perform the same function using the same IP
addresses, but they cannot or do not detect each other.
SSH Secure SHell. A program/network protocol that allows an end-user to log on
to another computer over a network, execute commands in the remote
machines OS, and move files from one machine to another. SSH provides
strong authentication. It secures communications over unsecured channels
and can be used when tunneling. For more information, see the SSH Internet
Draft at http://www.free.lp.se/fish/rfc.txt.
SSL Secure Socket Layer. Used for securing the transmission of messages over
insecure networks such as the Internet, SSL works by using asymmetric keys
to encrypt message data.
startup-config The settings that have been saved to the module’s flash memory. When the
module is booted, it reads settings from this file. See also running-config.
stateful A firewall or protocol that maintains session information for every connection
that passes through it.
stateless A firewall or protocol that does not maintain session information for connec-
tions that pass through it.
static route Routes that are manually added to the routing table.
stub area An area that receives traffic destined for its hosts, but does not pass any traffic
to another network. A stub area connects only with the normal area (back-
bone).
subject alternate
names
Names that you can specify along with a device’s CN that can identify the
device. These names are specified in a certificate request.