TMS zl Management and Configuration Guide ST.1.2.100916

B-17
Glossary
K
key In cryptography, a key is a unique value or string of text that is used to encrypt
data when that data is run through an encryption or hash algorithm. To decrypt
or dehash the data, a device must apply the correct key to the encrypted data.
The length of a key generally determines how difficult it will be to decrypt the
data. Keys can be either symmetric or asymmetric.
key exchange
method
The method used to generate the keys used to negotiate an IPsec SA, either IKE
or manual keying.
key exchange
mode
The mode used to initiate IKE. The two exchange modes are Main mode and
Aggressive mode. Also known as IKE mode.
L
L2TP Layer 2 Tunneling Protocol. A protocol that is used in VPNs. For more
information, see RFC 2661 at http://www.ietf.org/rfc/rfc2661.txt.
L2TP access
concentrator
See LAC.
L2TP network
server
See LNS.
L2TP remote
access
Remote access that uses L2TP.
LAC L2TP Access Concentrator. A device that virtually extends an Internet connec-
tion to an LNS, which is located at the corporate network.
land attack An attack where the attacker exploits the TCP protocol by sending a stream
of TCP SYN packets that have the same source and destination IP addresses
and TCP port number.
license The document granting you the legal right to use the TMS zl Module.
link state
advertisements
See LSA.
LNS L2TP Network Server. The device that provides access to the target L2TP VPN
network.
local database A database of user credentials stored on the TMS zl Module itself.