TMS zl Management and Configuration Guide ST.1.1.100226

B-32
Glossary
virtual IP address An IP address associated with a cluster rather than an individual member of a
cluster. The cluster will still receive packets in the event that a specific
network device fails.
virus A computer program that can copy itself and damage a computer system. A
virus cannot self-propagate as a worm can but is spread via infected removable
media (floppy disks, zip drives, USB drives) or by sending it over a network.
Viruses can be programmed to do all kinds of damage, such as erasing hard
drives, deleting files, or corrupting executables, or they can be relatively
benign (showing text or a graphic), but even the benign viruses use up
computer resources such as hard drive space, memory, and processor cycles.
Like biological viruses, they can modify themselves upon replication to avoid
easy detection.
VLAN Virtual Local Area Network. A standard that enables network administrators
to group end-users by logical function rather than by physical location. VLANs
are created on switches to segment networks into smaller broadcast domains,
enhance network security, and simplify network management. For more
information, see IEEE 802.1Q at http://www.ieee802.org/1/pages/
802.1Q.html.
VPN Virtual Private Network. A network that is tunneled through another network,
often a connection to a private network over the Internet. The tunneling is
usually achieved through authentication and encryption.
VPN client The remote endpoint in a client-to-site VPN.
VPN tunnel Network security technology that encapsulates packets as they travel through
a VPN.
VSRP Virtual Switch Redundancy Protocol. A multicast protocol that allows HA
cluster members to monitor each other’s health.
W
Web browser
interface
A management access method that requires an HTTPS over IP connection to
the module plus a Web browser. Firefox 2.x and later and IE 7 and later are
supported.
well-known port The port on which the IANA has assigned a protocol to run. For example, the
well-known port for HTTP is 80.
WinNuke attack An attack that is launched by sending out-of-band (OOB) data to port 139.