value that is suitable for most users. In general, Internet users should
follow the advice of their Internet service provider (ISP) about whether
to change the default value and what to change it to.
Network Access Control List rules that are applied to IP interfaces that are available on a router,
each with a list of hosts or networks that are permitted or denied to
use the service. Access control lists can be congured to control both
inbound and outbound trafc.
Network Time Protocol is a protocol that is used to synchronize computer clock times in a
network of computers. Developed by David Mills at the University of
Delaware, NTP is now an Internet standard. In common with similar
protocols, NTP uses Coordinated Universal Time (UTC) to synchronize
computer clock times to a millisecond, and sometimes to a fraction of
a millisecond.
Network Trafc
Classication Engine
also DPI, Deep Deep Packet Inspection
is a form of computer network packet ltering that examines the data
part (and possibly also the header) of a packet as it passes an inspection
point, searching for protocol non-compliance, viruses, spam, intrusions,
or dened criteria to decide whether the packet may pass or if it needs
to be routed to a different destination, or, for the purpose of collecting
statistical information.
Deep Packet Inspection (and ltering) enables advanced network
management, user service, and security functions as well as internet
data mining, eavesdropping, and internet censorship. Although DPI
technology has been used for Internet management for many years,
some advocates of net neutrality fear that the technology may be used
anticompetitively or to reduce the openness of the Internet.
Open Package lightweight package management system. It is intended for use on
embedded Linux devices and is used in this capacity in the OpenWrt
1
and Entware
2
projects. Opkg packages use the .ipk extension.
Password Authentication
Protocol
is an authentication protocol that uses a password. PAP is used by
Point-to-Point Protocol to validate users before allowing them access to
the remote network. PAP transmits unencrypted ASCII passwords over
the network and is therefore considered insecure.
Perfect Forward Secrecy is a property of secure communication protocols: a secure
communication protocol is said to have forward secrecy if compromise
of long-term keys does not compromise past session keys. PFS protects
past sessions against future compromises of secret keys or passwords.
Ping Check performs ICMP and TCP based tests to verify if the internet connection
is working ne. Test results may be used to switch between primary
and backup connections.
Point-to-Point Protocol is a protocol used to establish a direct connection between two nodes.
It can provide connection authentication, transmission encryption, and
1
https://www.openwrt.org/
2
https://github.com/Entware-ng/Entware-ng
Keenetic Lite (KN-1310) — Command Reference Guide
295
Glossary