Glossary
- Admin-shut
-
In scenarios where dual CPE delivery is in progress, it is possible that only one underlay internet connection is available during the initial CPE installation, resulting in a partial underlay delivery. In such cases, Service Delivery will proceed to onboard the device, but the unavailable WAN link port will be admin-shut.
- ARP
-
Address Resolution Protocol is sued to map an IP address to a corresponding MAC address within a local network. It allows devices communication on a data layer.
- AV
-
Antivirus
- BGP
-
Border Gateway Protocol is an exterior gateway protocol used to exchange routing information between different systems on the internet. It allows routers to maek intelligent routing decisions based on network policies.
- Captive Portal
-
Refers to a web page or portal that controls access to a network or internet connection. This allows the administrator to enforce policies, monitor usage, ensure security. An example of use can be a Captive Portal for connecting to an airport Wi-Fi.
- Central internet breakout (CIB)
-
Central Internet Breakout." It refers to the capability of routing internet-bound traffic directly from a central gateway or data centre instead of routing it through other locations or devices.
- CoS
-
Class of Service is a method of prioritizing and managing network traffic based on criteria such us QoS, app types or user policies.
- CVE
-
Common Vulnerabilities and Exposures.
- DDoS (IP Based DoS policy)
-
Measure implemented to protected against IP-based DoS attacks.
- DDoS
-
Distributed Denial of Service. It is a type of cyber-attack in which multiple compromised devices, are used to flood a targeted network or website with an overwhelming amount of traffic. The goal of a DDoS attack is to disrupt the normal functioning of the targeted system by overwhelming its resources, such as bandwidth, processing power, or memory, and rendering it inaccessible to legitimate users.
- DIA
-
Diameter protocol is used for authentication and authorization. It provides reliable communication between network elements and is commonly used in mobile networks and ISPs.
- DNAT
-
Destination NAT is a type of NAT where the destination IP address of incoming packets is modified before forwarding to a specific destination on the network. Common usage to redirect incoming traffic from a public IP to a private IP or server.
- DNS Proxy
-
An intermediate server that allows communication between the client device and destination server. It can offer added benefits like privacy, filtering of traffic, blocking malicious requests, caching, etc.
- FEC
-
Forward Error Connection. It is a technique used in communication systems to improve the reliability of data transmission over unreliable or error-prone channels.
- Gateway site
-
Virtual Network functions that provide routing between SDWAN and non SDWAN services, or Hybrid sites.
- IDP feature
-
The IDP (Intrusion Detection and Prevention) feature monitors network traffic and identifies suspicious or malicious activities, allowing proactive measures to be taken to prevent potential security breaches. Also see IDS/IPS Vulnerability.
- IP DSCP
-
Internet Protocol - Differentiated Services Code Point. It´s one of the fields within the IP header of a packer that is used for QoS. DSCP values allow network devices to differentiate and prioritize types of traffic, such as giving priority to voice or video over browsing or downloading.
- IP Filtering
-
Also known as packet filtering, involves setting up rules or filters on a network device such router or firewall, to allow/block specific IP addresses or ranges.
- IPC
-
International Private Circuit. IPCs are often used by businesses to connect their offices or branches located in different countries and enable reliable and secure communication between them.
- IPfix
-
Internet Protocol Flow Information Export. It is a protocol used for collecting and exporting network flow information, such as IP traffic statistics, from network devices.
- IPS Vulnerability Profile
-
A collection of rules and configurations on how the IPS should detect and respond to specific vulnerabilities that are most relevant to the customer.
- IPS Vulnerability
-
This refers to a weakness or flaw in the IPS.
- IPS
-
Intrusion Prevention System. Security system that actively monitors incoming and outgoing network packets for suspicious or malicious activity.
- Local internet breakout (LIB)
-
It refers to the ability to route internet traffic locally at each site or branch office instead of sending it to a central gateway. With LIB, each site has its own dedicated internet connection, providing localized internet access and reducing the reliance on the central infrastructure for internet connectivity.
- NAT rules
-
The NAT rules play an important role in allowing devices within private networks to communicate with the outside world and manage traffic effectively.
- NAT
-
Network Address Translation is a network technology that allows multiple devices within a local network to share a single public IP address. It translates private IP addresses used within the local network into a public IP address when communicating with devices on the internet. NAT helps conserve IPv4 address space and provides an additional layer of security by hiding the internal IP addresses from external networks.
- NAT
-
Network Address Translation is a technique that allows multiple devices on a network to share a single public IP address.
- Netflow
-
It is a network protocol developed by Cisco for collecting and monitoring IP traffic flow information.
- OSPF
-
Open Shortest Path First. It´s an interior gateway protocol used in a system to determine best paths for routing IP packets. It can calculate the shortest path and dynamically updates routing to ensure efficiency.
- Packet Replication
-
Packet replication is a technique used in networking and data transmission to create duplicate copies of packets and send them across multiple paths simultaneously. This helps in improving the reliability and performance of data delivery by reducing the impact of packet loss or network congestion.
- QoS
-
Quality of Service refers to the set of techniques and mechanisms used to manage and prioritize network traffic to ensure reliable and predictable performance. By implementing QoS policies, companies can control factors such as latency, jitter, and packet loss, and ensure optimal performance.
- Regex expressions/patterns
-
Regular expressions are search patterns that allow to find and manage specific information in a text.
- Root CA Certificate
-
This is a digital certificate that is used to validate and authorize trust in the identity of other certificates thus ensuring that online interactions are secure.
- RTP flows
-
Real-Time Transport Protocol flows, which are used for transmitting real-time audio and video data over IP networks. Commonly used in applications like video and voice conferencing, media streaming.
- SaaS Optimization
-
Software as a Service, which refers to cloud-based software applications delivered over the internet. SaaS Optimization involves the optimization of network and application performance specifically for SaaS applications. It ensures that SaaS applications run efficiently, providing a better user experience by optimizing factors such as network latency, bandwidth utilization, and application delivery.
- SDWAN multi cloud
-
Refers to the capability of an SDWAN solution to connect and optimize connectivity across multiple cloud environments. It enables organizations to establish secure and reliable connections between their branch offices and multiple cloud service providers (CSPs) or cloud platforms. SDWAN Multi-Cloud provides centralized management and control over network traffic, allowing businesses to leverage multiple cloud resources efficiently and enhance their overall cloud connectivity and performance.
- SDWAN
-
Software-Defined Wide Area Networking. It is a technology that allows organizations to efficiently and securely connect their branch offices or remote locations to a wide area network (WAN). SDWAN simplifies the management and operation of a WAN by separating the network hardware from its control mechanism, utilizing software-defined networking principles.
- Secure Log Forwarding
-
This is a method of sending log data from one device to another in secure way that keeps the information protected. This is achieved by encryption and authentication. Log data is a collection of events and/or activities on a system/application/device/network level.
- SNAT
-
Source NAT, where the source IP of outgoing packets is modified before leaving the network. It translates private IP addresses to public IP.
- SNMP
-
Simple Network Management Protocol. It is a protocol used for network management and monitoring. SNMP allows to monitor and manage network devices, such as routers, switches, and servers, by collecting and exchanging information about their status, performance, and configuration.
- SSL Certificate
-
Secure Sockets Layer Certificate, is a digital certificate authenticating the identity of a website/server and allows secure communication over the internet. Common usage is for the establishment of a secure and encrypted connection between a browser and a server.
- SSL Decryption
-
This refers to the process of decrypting SSL encrypted traffic for inspection or monitoring purposes.
- SYSLOG
-
Syslog is a standard protocol used to send log data from network devices and applications, for storage and analysis.
- TCP
-
Transmission Control Protocol establishes a virtual connection between sender and receiver. It ensures data integrity and flow control.
- Traceroute
-
It´s a diagnostic tool used to trace the path that network packets take from a source device to a destination. It shows the intermediate nodes (routers) through which the packets pass, helping identify network issues and measure latency.
- TX/RX
-
Transmit/Receive. It refers to the transmission and reception of data signals.
- UDP
-
User Datagram Protocol. This protocol is used for time-sensitive or real-time applications where speed is prioritized over reliability. Unlike TCP, UDP does not establish a dedicated connection.
- VLAN
-
Virtual Local Area Network. Allows multiple virtual networks to coexist in a single physical network infrastructure.
- VRF
-
Virtual Route Forwarding. Defines unique VPNs for customer traffic and can be used to ensure secure and isolated communication (within a single physical infrastructure) between different sites or networks within an organization. VRF can be applied on LAN and WAN networks.
- ZTP URL
-
Zero Touch provisioning URL, which is a web address that enables automated provisioning and configuration of the CPE device.