User manual
Appendix A – Terminology 
280
SHA  Secure Hash Algorithm, a 160 bit hash. It is one of two message digest 
algorithms available in IPSec. 
Security 
Parameter Index 
(SPI) 
Security Parameter Index, an index used within IPsec to keep 
connections distinct. Without the SPI, two connections to the same 
gateway using the same protocol could not be distinguished. 
Subnet mask  See "Net mask". 
Switch  A network device that is similar to a hub, but much smarter. Although 
not a full router, a switch partically understands how to route Internet 
packets. A switch increases LAN efficiency by utilizing bandwidth more 
effectively. 
TCP/IP  Transmission Control Protocol/Internet Protocol. The basic protocol for 
Internet communication. 
TCP/IP address  Fundamental Internet addressing method that uses the form 
nnn.nnn.nnn.nnn. 
TripleDES 
(3DES) 
Using three DES encryptions on a single data block, with at least two 
different keys, to get higher security than is available from a single DES 
pass. 
UTC  Coordinated Universal Time. 
UTP  Unshielded Twisted Pair cabling. A type of Ethernet cable that can 
operate up to 100Mbits/s. Also known as Category 5 or CAT 5. 
VPN  Virtual Private Networking. When two locations commmunicate 
securely and effectively across a public network (e.g. the Internet). 
The three key features of VPN technology are privacy (nobody can see 
what you are communicating), authentication (you know who you are 
communicating with), and integrity (nobody can tamper with your 
messages/data). 
WAN  Wide Area Network. 
WINS  Windows Internet Naming Service that manages the association of 
workstation names and locations with IP addresses. 
x.509 Certificates  An x.509 certificate includes the format of the certificate, the serial 
number of the certificate, the algorithm used to sign the certificate, the 
name of the CA that issued the certificate, the name and public key of 
the entity requesting the certificate, and the CA's signature.x.509 
certificates are used to authenticate the remote party against a 
Certificate Authority's (CA) certificate. The CA certificate must have 
signed the local certificates that are used for tunnel authentication. 
Certificates need to be uploaded into the SG unit before a tunnel can 
be configured to use them (see Certificate Management). 










