Glossary

Admin-shut

In scenarios where dual CPE delivery is in progress, it is possible that only one underlay internet connection is available during the initial CPE installation, resulting in a partial underlay delivery. In such cases, Service Delivery will proceed to onboard the device, but the unavailable WAN link port will be admin-shut.

ARP

Address Resolution Protocol is sued to map an IP address to a corresponding MAC address within a local network. It allows devices communication on a data layer.

AV

Antivirus

BGP

Border Gateway Protocol is an exterior gateway protocol used to exchange routing information between different systems on the internet. It allows routers to maek intelligent routing decisions based on network policies.

Captive Portal

Refers to a web page or portal that controls access to a network or internet connection. This allows the administrator to enforce policies, monitor usage, ensure security. An example of use can be a Captive Portal for connecting to an airport Wi-Fi.

Central internet breakout (CIB)

Central Internet Breakout." It refers to the capability of routing internet-bound traffic directly from a central gateway or data centre instead of routing it through other locations or devices.

CoS

Class of Service is a method of prioritizing and managing network traffic based on criteria such us QoS, app types or user policies.

CVE

Common Vulnerabilities and Exposures.

DDoS (IP Based DoS policy)

Measure implemented to protected against IP-based DoS attacks.

DDoS

Distributed Denial of Service. It is a type of cyber-attack in which multiple compromised devices, are used to flood a targeted network or website with an overwhelming amount of traffic. The goal of a DDoS attack is to disrupt the normal functioning of the targeted system by overwhelming its resources, such as bandwidth, processing power, or memory, and rendering it inaccessible to legitimate users.

DIA

Diameter protocol is used for authentication and authorization. It provides reliable communication between network elements and is commonly used in mobile networks and ISPs.

DNAT

Destination NAT is a type of NAT where the destination IP address of incoming packets is modified before forwarding to a specific destination on the network. Common usage to redirect incoming traffic from a public IP to a private IP or server.

DNS Proxy

An intermediate server that allows communication between the client device and destination server. It can offer added benefits like privacy, filtering of traffic, blocking malicious requests, caching, etc.

FEC

Forward Error Connection. It is a technique used in communication systems to improve the reliability of data transmission over unreliable or error-prone channels.

Gateway site

Virtual Network functions that provide routing between SDWAN and non SDWAN services, or Hybrid sites.

IDP feature

The IDP (Intrusion Detection and Prevention) feature monitors network traffic and identifies suspicious or malicious activities, allowing proactive measures to be taken to prevent potential security breaches. Also see IDS/IPS Vulnerability.

IP DSCP

Internet Protocol - Differentiated Services Code Point. It´s one of the fields within the IP header of a packer that is used for QoS. DSCP values allow network devices to differentiate and prioritize types of traffic, such as giving priority to voice or video over browsing or downloading.

IP Filtering

Also known as packet filtering, involves setting up rules or filters on a network device such router or firewall, to allow/block specific IP addresses or ranges.

IPC

International Private Circuit. IPCs are often used by businesses to connect their offices or branches located in different countries and enable reliable and secure communication between them.

IPfix

Internet Protocol Flow Information Export. It is a protocol used for collecting and exporting network flow information, such as IP traffic statistics, from network devices.

IPS Vulnerability Profile

A collection of rules and configurations on how the IPS should detect and respond to specific vulnerabilities that are most relevant to the customer.

IPS Vulnerability

This refers to a weakness or flaw in the IPS.

IPS

Intrusion Prevention System. Security system that actively monitors incoming and outgoing network packets for suspicious or malicious activity.

Local internet breakout (LIB)

It refers to the ability to route internet traffic locally at each site or branch office instead of sending it to a central gateway. With LIB, each site has its own dedicated internet connection, providing localized internet access and reducing the reliance on the central infrastructure for internet connectivity.

NAT rules

The NAT rules play an important role in allowing devices within private networks to communicate with the outside world and manage traffic effectively.

NAT

Network Address Translation is a network technology that allows multiple devices within a local network to share a single public IP address. It translates private IP addresses used within the local network into a public IP address when communicating with devices on the internet. NAT helps conserve IPv4 address space and provides an additional layer of security by hiding the internal IP addresses from external networks.

NAT

Network Address Translation is a technique that allows multiple devices on a network to share a single public IP address.

Netflow

It is a network protocol developed by Cisco for collecting and monitoring IP traffic flow information.

OSPF

Open Shortest Path First. It´s an interior gateway protocol used in a system to determine best paths for routing IP packets. It can calculate the shortest path and dynamically updates routing to ensure efficiency.

Packet Replication

Packet replication is a technique used in networking and data transmission to create duplicate copies of packets and send them across multiple paths simultaneously. This helps in improving the reliability and performance of data delivery by reducing the impact of packet loss or network congestion.

QoS

Quality of Service refers to the set of techniques and mechanisms used to manage and prioritize network traffic to ensure reliable and predictable performance. By implementing QoS policies, companies can control factors such as latency, jitter, and packet loss, and ensure optimal performance.

Regex expressions/patterns

Regular expressions are search patterns that allow to find and manage specific information in a text.

Root CA Certificate

This is a digital certificate that is used to validate and authorize trust in the identity of other certificates thus ensuring that online interactions are secure.

RTP flows

Real-Time Transport Protocol flows, which are used for transmitting real-time audio and video data over IP networks. Commonly used in applications like video and voice conferencing, media streaming.

SaaS Optimization

Software as a Service, which refers to cloud-based software applications delivered over the internet. SaaS Optimization involves the optimization of network and application performance specifically for SaaS applications. It ensures that SaaS applications run efficiently, providing a better user experience by optimizing factors such as network latency, bandwidth utilization, and application delivery.

SDWAN multi cloud

Refers to the capability of an SDWAN solution to connect and optimize connectivity across multiple cloud environments. It enables organizations to establish secure and reliable connections between their branch offices and multiple cloud service providers (CSPs) or cloud platforms. SDWAN Multi-Cloud provides centralized management and control over network traffic, allowing businesses to leverage multiple cloud resources efficiently and enhance their overall cloud connectivity and performance.

SDWAN

Software-Defined Wide Area Networking. It is a technology that allows organizations to efficiently and securely connect their branch offices or remote locations to a wide area network (WAN). SDWAN simplifies the management and operation of a WAN by separating the network hardware from its control mechanism, utilizing software-defined networking principles.

Secure Log Forwarding

This is a method of sending log data from one device to another in secure way that keeps the information protected. This is achieved by encryption and authentication. Log data is a collection of events and/or activities on a system/application/device/network level.

SNAT

Source NAT, where the source IP of outgoing packets is modified before leaving the network. It translates private IP addresses to public IP.

SNMP

Simple Network Management Protocol. It is a protocol used for network management and monitoring. SNMP allows to monitor and manage network devices, such as routers, switches, and servers, by collecting and exchanging information about their status, performance, and configuration.

SSL Certificate

Secure Sockets Layer Certificate, is a digital certificate authenticating the identity of a website/server and allows secure communication over the internet. Common usage is for the establishment of a secure and encrypted connection between a browser and a server.

SSL Decryption

This refers to the process of decrypting SSL encrypted traffic for inspection or monitoring purposes.

SYSLOG

Syslog is a standard protocol used to send log data from network devices and applications, for storage and analysis.

TCP

Transmission Control Protocol establishes a virtual connection between sender and receiver. It ensures data integrity and flow control.

Traceroute

It´s a diagnostic tool used to trace the path that network packets take from a source device to a destination. It shows the intermediate nodes (routers) through which the packets pass, helping identify network issues and measure latency.

TX/RX

Transmit/Receive. It refers to the transmission and reception of data signals.

UDP

User Datagram Protocol. This protocol is used for time-sensitive or real-time applications where speed is prioritized over reliability. Unlike TCP, UDP does not establish a dedicated connection.

VLAN

Virtual Local Area Network. Allows multiple virtual networks to coexist in a single physical network infrastructure.

VRF

Virtual Route Forwarding. Defines unique VPNs for customer traffic and can be used to ensure secure and isolated communication (within a single physical infrastructure) between different sites or networks within an organization. VRF can be applied on LAN and WAN networks.

ZTP URL

Zero Touch provisioning URL, which is a web address that enables automated provisioning and configuration of the CPE device.