We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Glossary

G Suite Password Sync (GAPS)
  • Also known as: GAPS

Enables you to synchronize users' G Suite passwords with their Microsoft Active Directory passwords.

gateway route

Next-hop route to a network that cannot be directly accessed. Example: default route (0.0.0.0/0), that forwards packets not belonging to a the directly attached network to the remote gateway provided by the ISP. 

Gb

A gigabit, or 10^9 bits.

GB 

A gigabyte, or 10^9 bytes, or 8000 million bits.

generic forwarding

With generic forwarding, requests from networks are forwarded without any firewall intervention even if the firewall is switched off.

generic network object

GeoIP

Locating a computer's geographic location based on its IP address.

GHz
  • Also known as: gigahertz

A unit of frequency equal to 10^9 hertz, which is defined as one cycle per second.

GiB

A gibibyte. A contraction of "giga" "binary" byte, a gibibyte is 2^30 or 1,073,741,824 bytes. It is slightly larger than a gigabyte (GB), which is 10^9 or 1,000,000,000 bytes.

Glacier

Amazon AWS cloud archiving service for storage of old data (commonly after 30 days).

Global Server Load Balancing
  • Also known as: GSLB

Distributing traffic among multiple resources in different geographies.

Google Accounts Enforcement

Integration of Google Accounts, for example in authentication processes.

Google Active Directory Sync
  • Also known as: GADS

Enables you to synchronize the data in your Google domain with your Microsoft Active Directory or LDAP server.

Google App Engine

A service that enables developers to create and run web applications on Google's infrastructure and share their applications via a pay-as-you-go, consumption-based plan with no setup costs or recurring fees.

granular scheduling

Selecting specific sets of data to back up and configure multiple schedules for each data source, each with a different set of selected data.

GRE
  • Also known as: Generic Routing Encapsulation

Generic Routing Encapsulation is a tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. 

Group Policy Object
  • Also known as: GPO

A collection of settings that define what a system will look like and how it will behave for a defined group of users.

GTI Editor
  • Also known as: Graphical Tunnel Interface

The Barracuda CloudGen Firewall VPN Graphical Tunnel Interface (GTI) Editor displays VPN site-to-site tunnels on a graphical interface.

guest access

Feature that lets you set up a confirmation page or ticketing system to temporarily grant guests access to the network.

H.323

Standard that defines the protocols to provide audio-visual communication sessions on any packet network. H.323 addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multi-point conferences.

half duplex

A communication system between two entities in which data transmission occurs in only one direction at a time between a sending station and a receiving station. Compare to full duplex.

hardware refresh

Barracuda program that allows existing appliance customers with an active Energize Updates subscription to migrate to the latest hardware platforms at a reduced price -- ensuring customers benefit from the latest hardware improvements and firmware capabilities.

high availability
  • Also known as: HA

Deployment method that ensures that the services running on the system are always available even if one system is down due to maintenance or a hardware fault.

HIPAA

The Health Insurance Portability and Accountability Act of 1996, gives patients in the US rights over their health information and sets rules and limits on who can look at and receive health information. The Privacy Rule applies to all forms of individuals' protected health information, whether electronic, written, or oral. The Security Rule is a Federal law that requires security for health information in electronic form. For details, visit http://www.hhs.gov/ocr/privacy/hipaa/understanding/

HMAC
  • Also known as: Hash-based Message Authentication Code

A specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key. 

hop distance

A unit of measure used to express the number or routers that a packet must pass through its way to its destination.

host firewall service

The firewall service responsible for governing traffic to and from local services running on the Barracuda CloudGen Firewall F-Series and Barracuda Firewall Control Center. 

hosted zone

A collection of resource record sets that Amazon Route 53 hosts. Like a traditional DNS zone file, a hosted zone represents a collection of records that are managed together under a single domain name.

hostname

Label assigned to a device connected to a computer network. Used to identify the device in various forms of electronic communication.

hostname object
  • Also known as: hostname network object

Network objects on the Barracuda CloudGen Firewall where the IP addresses are determined by DNS resolution.

HTTP
  • Also known as: Hypertext Transfer Protocol

Protocol for submitting data over a network, commonly used to load website content in a web browser.

HTTP Proxy service

Service on the Barracuda CloudGen Firewall that acts as an intermediary for HTTP and HTTPS requests from network clients. The HTTP Proxy can cache and scan web traffic.

HTTP referer

HTTP header field that identifies the address of the webpage (i.e., the URI or IRI) that links to the resource being requested. (Originally a misspelling of referrer.) 

HTTPS
  • Also known as: Hypertext Transfer Protocol Secure

Consists of communication over HTTP within a connection encrypted by TLS or SSL. The main motivation is authentication of the visited website and protection of the privacy and integrity of the exchanged data.

hub and spoke
  • Also known as: hub-and-spoke

Network architecture that uses a central connecting point.

HVM

Hardware Virtual Machine (HVM) virtualization allows the guest VM to run as though it is on a native hardware platform, except that it still uses paravirtual (PV) network and storage drivers for improved performance.

hybrid cloud

The combination of a public cloud provider (such as AWS) with a private cloud platform. The public and private cloud infrastructures operate independently of each other, and integrate using software and processes that allow for the portability of data and applications.

hybrid network

Internetwork made up of more than one type of network technology, including LANs and WANs.

Hyper-V

Native Hypervisor on Windows, created by Microsoft.

hypervisor

Computer software, firmware, or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a "host machine". Each virtual machine is called a "guest machine".

IaaS
  • Also known as: Infrastructure as a Service

Cloud infrastructure services in which a virtualized environment is delivered as a service by the cloud provider.

IAM
  • Also known as: Identity and Access Management

The Identity and Access Management feature of cloud services (like AWS)  that lets you control who can use the provider's services and resources (authentication) and what resources they can use in which ways (authorization).

IANA
  • Also known as: Internet Assigned Numbers Authority

The Internet Assigned Numbers Authority organization delegates authority for IP address-space allocation and domain-name assignment to the NIC and other organizations and maintains a database of assigned protocol identifiers used in the TCP/IP stack, including autonomous system numbers.

IGP
  • Also known as: Internet Gateway Protocol

Internet protocol used to exchange routing information within an autonomous system. Examples of common Internet IGPs include IGRP, OSPF, and RIP.

IKE
  • Also known as: Internet Key Exchange protocol

Internet Key Exchange protocol, used to set up a security association (SA) in the IPsec protocol suite.

Infrastructure Services

Infrastructure is the backbone of all of your business operations.

inline authentication

Authentication method that intercepts unauthorized users HTTP or HTTPS connections and redirects them to a login page, for example, on the Barracuda NextGen Firewall. After successful authentication the user is forwarded to the original destination.

inline deduplication

The removal of redundancies from data before or as it is being written to a backup device. This reduces the amount of redundant data in an application and the capacity needed for the backup disk targets, in comparison to post-process deduplication. However, inline deduplication can slow down the overall data backup process.

instance

A "copy" of a virtual appliance/image/machine that is being installed, brought up, configured, etc. In the context of an AWS deployment, a virtual product (for example, a Barracuda CloudGen Firewall) that runs on Amazon Web Services (AWS).

instant replacement

With an Instant Replacement subscription, if your Barracuda Networks product fails, we will ship you a replacement unit within one business day so you can get back up and running soon. Instant Replacement subscriptions also work toward getting updated hardware through the Hardware Refresh program.

Intrusion Detection System

Network security feature that monitors local and forwarding firewall traffic for malicious activities.

Intrusion Prevention System
  • Also known as: IPS, IDS, Intrusion Detection System

Configurable network security feature that monitors local and forwarding firewall traffic for malicious activities.

Invalid Bounce Suppression

Feature used to determine whether the bounce address specified in a message is valid. It is designed to reduce the number of bounce messages to forged return addresses.

IOPS
  • Also known as: input/output operations per second

Performance measurement of input/output operations per second, used to characterize computer storage devices like hard disk drives (HDD), solid state drives (SSD), and storage area networks (SAN).

IoT
  • Also known as: Internet of Things

Devices that can now intercommunicate with each other and the Internet.

IP address
  • Also known as: Internet Protocol address

A numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.

IPFIX streaming
  • Also known as: IP Flow Information Export , IPFIX, Internet Protocol Flow Information Export

Standard for exchange of network monitoring information. Feature that enables the Barracuda NextGen Firewall to stream log data to IPFIX collectors.

 

IPsec
  • Also known as: Internet Protocol security

A framework of open standards for protecting communications over Internet Protocol (IP) networks.

IPv4, IPv6

The fourth and sixth versions, respectively, of the Internet Protocol (IP). Following are examples of notation for each type of address:

IPv4    192.0.2.235

IPv6    2001:0db8:0000:0042:0000:8a2e:0370:7334

IS
  • Also known as: intermediate system

Routing node in an OSI network.

ISAKMP
  • Also known as: Internet Security Association and Key Management Protocol

Protocol defined by RFC 2408 for establishing Security Associations (SA) and cryptographic keys in an Internet environment. It is part of IKE.

ISDN
  • Also known as: Integrated Services Digital Network

Communication protocol offered by telephone companies that permits telephone networks to carry data, voice, and other source traffic.

ISP
  • Also known as: Internet Service Provider

Organization that provides access to the Internet.

iWSA

Barracuda Web Security Agent