TMS zl Management and Configuration Guide ST.1.2.100916
B-11
Glossary
F
failover The ability to automatically switch over to a secondary device in the event
that the primary device fails.
firewall access
policy
A rule that specifies which traffic can pass between TMS VLANs. Firewall
access policies are classified by source and destination zones, multicast or
unicast, and user group.
firewall port map A port map shows which service and associated protocol are assigned to which
port on your network. The firewall and IDS/IPS uses the port map to track
session information, including source and destination ports and translated
ports (for NAT).
firewall priority The order in which the firewall compares an incoming packet to a policy
group. The highest priority is 1, which is the first policy that is compared to
the packet.
firewall zone One of 11 pre-defined zones, which are logical groupings of VLANs for which
you can configure similar firewall access policies. The Self zone filters all
traffic to or from the module itself. Access control zones filter traffic that
crosses VLAN boundaries: External, Internal, DMZ, Self, Zone1, Zone2, Zone3,
Zone4, Zone5, and Zone6.
FQDN Fully Qualified Domain Name. An FQDN specifies the exact location of a
node in the DNS’s tree hierarchy. For example: eng.university.edu.
fragment before
IPsec
An IPsec option where packets are fragmented before they are encrypted. This
helps remote tunnel endpoints process and decrypt the packets more quickly.
FTP File Transfer Protocol. A protocol for transferring files between networks,
which only runs on top of TCP. FTP servers “listen” on port 21 for requests
from a client. When a request is received the host and client negotiate an
alternate port through which they will send the data. The data can be sent in
active, passive, or extended passive modes. FTP offers no method for encrypt-
ing data, and is inherently unsecure. For more information, see RFC 959 at
http://www.ietf.org/rfc/rfc0959.txt.