User's Manual

DMZ
238 Check Point Safe@Office User Guide
DHCP uses the concept of a
"lease" or amount of time that a
given IP address will be valid for
a computer.
DMZ
A DMZ (demilitarized zone) is
an internal network defined in
addition to the LAN network and
protected by the Appliance.
Domain Name System
The Domain Name System
(DNS) refers to the Internet
domain names, or easy-to-
remember "handles", that are
translated into IP addresses.
An example of a Domain Name
is 'www.sofaware.com'.
E
Exposed Host
An exposed host allows one
computer to be exposed to the
Internet. An example of using an
exposed host would be exposing
a public server, while preventing
outside users from getting direct
access form this server back to
the private network.
F
Firmware
Software embedded in a device.
G
Gateway
A network point that acts as an
entrance to another network.
H
Hacking
An activity in which someone
breaks into someone else's
computer system, bypasses
passwords or licenses in
computer programs; or in other
ways intentionally breaches
computer security. The end
result is that whatever resides on
the computer can be viewed and
sensitive data can be stolen
without anyone knowing about
it. Sometimes, tiny programs are
'planted' on the computer that are
designed to watch out for, seize
and then transmit to another
computer, specific types of data.
HTTPS
Hypertext Transfer Protocol over
Secure Socket Layer, or HTTP
over SSL.
A protocol for accessing a secure
Web server. It uses SSL as a
sublayer under the regular HTTP
application. This directs
messages to a secure port
number rather than the default
Web port number, and uses a
public key to encrypt data