TMS zl Management and Configuration Guide ST.1.1.100226

B-33
Glossary
X
XAUTH eXtended AUTHentication. An IKE extension that permits the use of legacy
protocols such as RADIUS, SecurID, and OTP. For more information, see the
Internet Draft at http://www.vpnc.org/ietf-xauth/draft-beaulieu-ike-xauth-
02.txt.
Z
zero-day attack Any new and previously unknown attack. Zero-day attacks are especially
dangerous because no signature exists that can detect them.
zone Logical groupings of VLANs that can be created when the TMS zl Module is in
routing mode. Firewall and NAT policies govern traffic flow between zones.
The TMS zl Module has ten zones: Self, Internal, External, DMZ, Zone1, Zone2,
Zone3, Zone4, Zone5, and Zone6.
Zone<x> Zone1–Zone6. Additional zones that are intended for whatever the user needs:
additional internal VLANs, more VLANs in the DMZ, or other VLANs that
connect to untrusted networks.