EasyManua.ls Logo

Check Point UTM-1 Edge - Page 696

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Glossary of Terms
682 Check Point UTM-1 Edge User Guide
At the other end (the client program in
your computer), TCP reassembles the
individual packets and waits until they
have arrived to forward them to you as a
single file.
TCP/IP
TCP/IP (Transmission Control
Protocol/Internet Protocol) is the
underlying communication protocol of
the Internet.
U
UDP
UDP (User Datagram Protocol) is a
communications protocol that offers a
limited amount of service when
messages are exchanged between
computers in a network that uses the
Internet Protocol (IP). UDP is an
alternative to the Transmission Control
Protocol (TCP) and, together with IP, is
sometimes referred to as UDP/IP. Like
the Transmission Control Protocol,
UDP uses the Internet Protocol to
actually get a data unit (called a
datagram) from one computer to
another. Unlike TCP, however, UDP
does not provide the service of dividing
a message into packets (datagrams) and
reassembling it at the other end.
UDP is often used for applications such
as streaming data.
URL
A URL (Uniform Resource Locator) is
the address of a file (resource)
accessible on the Internet. The type of
resource depends on the Internet
application protocol. On the Web
(which uses the Hypertext Transfer
Protocol), an example of a URL is
'http://www.sofaware.com'.
V
VPN
A virtual private network (VPN) is a
private data network that makes use of
the public telecommunication
infrastructure, maintaining privacy
through the use of a tunneling protocol
and security procedures.
VPN tunnel
A secure connection between a Remote
Access VPN Client and a Remote
Access VPN Server.

Table of Contents

Related product manuals