TMS zl Management and Configuration Guide ST.1.2.100916

B-24
Glossary
polymorphism The capability of an object to assume more than one property, often shifting
from one property to another in response to external stimuli.
port address
translation
See PAT.
port forwarding The process in which traffic addressed to one port is forwarded to a different
port. Port forwarding is often employed when a network is running well-
known protocols on non-standard ports.
port map A port-to-application association that informs the IDS/IPS and ALGs which type
of traffic to expect on a particular port.
port trigger A process that allows the TMS zl Module to dynamically and automatically
forward traffic on particular ports. Port triggers are configured on ports for
applications that require dynamically negotiated ports.
position The position of a policy among other policies. The firewall checks packets
against policies in the order in which they are listed, so a policy with a higher
position (value closer to 1) is checked first.
PR Problem report. Used in the TMS zl Module release notes to describe a known
issue with the module.
pre-connection
ACK
An attack check that the TMS zl Module performs in which the module sends
a RST packet whenever it receives ACK packet without first receiving a SYN
packet.
preshared key See PSK.
priority The position of an object relative to other objects. A policy in the top position
(1) is applied first, then the next policy, then the next. As soon as a packet
matches a policy, that policy is applied and all other policies are ignored. A
module in top position (255) is elected master of an HA cluster.
priority VLAN A VLAN from which you can gain management access regardless of traffic
volume or workload.
protocol anomaly Deviation of a protocol from standard specifications (set by RFCs and com-
mon practice). Protocol anomalies are often a sign of an attack, for which a
signature has not yet been recognized.
protocol data unit See PDU.
PSK Preshared Key. A text string agreed upon by two parties in advance. In IKE
negotiations, peers can exchange a pre-shared key that is between 8 and 255
characters long to authenticate each other before opening the IKE SA.