EasyManuals Logo

Sophos WS100 User Manual

Sophos WS100
237 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #231 background imageLoading...
Page #231 background image
G.4 certificate authority
Certificate authorities are trusted third parties.They can be root authorities (i.e. explicitly trusted).
They can have identities that can be verified by checking with other trusted certificate authorities
(such as the root authorities). Or you can choose to designate a CA as trusted (such as an authority
within your organization).
G.5 Classless Inter-Domain Routing
Classless Inter-Domain Routing (CIDR) is an internet address assignment and aggregation
strategy. CIDR, pronounced cider or cedar, is a refinement to the way IP addresses are
interpreted that replaces the previous generation of IP address syntax (the Class A, B, and C
addressing scheme). It allows greater flexibility when dividing ranges of IP addresses into separate
networks, thus providing more efficient use of increasingly scarce IPv4 addresses.The CIDR
strategy is described in RFC 1519.
G.6 command and control center
A command and control center is a computer that controls a botnet. A command and control
center (C&C or C2) is a computer that controls a botnet (a network of compromised computers).
Some botnets use distributed command and control systems, making them more resilient. From
the command and control center, hackers can instruct multiple computers to perform their desired
activities. Command and control centers are often used to launch distributed denial-of-service
attacks because they can instruct a vast number of computers to perform the same action at the
same time.
G.7 eDirectory
A multi-platform server application from Novell that supports LDAP (Lightweight Directory Access
Protocol). eDirectory is a hierarchical, object-oriented database that allows access to LDAP clients.
G.8 FTP-over-HTTP
A configuration to proxy browser-based connections to FTP sites.
FTP-over-HTTP refers to proxying browser-based connections to FTP sites. It is not related to
FTP servers that provide HTTP front ends as an alternative (for example, as is done on many
open source mirror sites). FTP-over-HTTP works as follows:
1. Configure your browser to use the Web Appliance for FTP.
This will cause your browser to communicate to the proxy (Web Appliance) via HTTP for both
HTTP and FTP requests.
Sophos Web Appliance | Glossary | 231

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Sophos WS100 and is the answer not in the manual?

Sophos WS100 Specifications

General IconGeneral
BrandSophos
ModelWS100
CategoryFirewall
LanguageEnglish

Related product manuals