We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Glossary

PaaS
  • Also known as: platform as a service

Cloud platform services, where the computing platform (operating system and associated services) is delivered as a service over the Internet by the provider.

packet
  • Also known as: pkt

A unit of data routed between an origin and a destination over a network.

packet fragmentation

Part of the processing of TCP IP traffic that consists of fragmenting, sending, and reassembling packets.

padding

Additional, meaningless data adds to a packet to increase its size.

pagination

1. The process of responding to an API request by returning a large list of records in small separate parts. 

2. Breaking a document into separate pages and assigning them numbers or letters. 

partition key
  • Also known as: hash attribute

A simple primary key, composed of one attribute. Also known as a hash attribute.

PAR file
  • Also known as: parchive file, parity archive file

Used to back up and restore configurations for the Barracuda CloudGen Firewall or the Barracuda Firewall Control Center. The PAR file contains all configuration settings. 

passphrase

Series of characters that must be provided by the user for input to the cryptographic key generation process. Must be no less than eight logical characters and can contain spaces.

PAT
  • Also known as: port address translation

Conserves IP addresses by permitting multiple devices on a local network to be mapped to a single public IP address. An extension to network address translation (NAT).

PAYG

PCI DSS
  • Also known as: Payment Card Industry Data Security Standard, PCI-DSS

Standards for security practices when using payment cards (e.g., credit, debit, gift).https://www.pcisecuritystandards.org/security_standards/

peer

A device to which a computer has a network connection that is relatively symmetrical and where both devices can initiate or respond to a similar set of requests.

persistent storage

A data storage solution where the data remains intact until it is deleted.

Personal Firewall

Component of the Barracuda Network Access Client. Centrally managed host firewall that can handle up to four different rulesets at once, depending on the policy applicable to user, machine, date, and time

phishing
  • Also known as: phishing attack

Attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. See also spear phishing.

PIP
  • Also known as: Public Instance Level IP address

Public Instance Level IP address that is assigned directly to a VM and bypasses the Azure Load Balancer. 

PKCS #n
  • Also known as: Public Key Cryptography Standards

Refers to a group of standards, in the format PKCS #n, where n =1 to 15. For example: Certificates can be downloaded in PKCS #12 format, which includes the private key and certificate.

PKI
  • Also known as: Public Key Infrastructure

A system for distributing and using public encryption keys, enabling secure data exchange over the Internet.

Placement Group

Logical grouping of AWS instances within a single Availability Zone.

policy routing

Also called source-based routing, is used when the source IP address of the connection determines, in part or completely, which route is used.

policy simulator

A tool in the IAM AWS Management Console that helps you test and troubleshoot policies so you can see their effects in real-world scenarios.

polling

A means of Media Access Control where a device may only transmit information when it is given permission to transmit by a controller device.

polymorphic threat

A threat that appears differently to threat detection systems, but is functionally the same. An advanced threat that signatures alone cannot detect.

POP
  • Also known as: Post Office Protocol

A protocol used to retrieve email from a mail server.

PPK
  • Also known as: PuTTY Private Key

Files created by PuTTY and used for key authentication.

PPPoE
  • Also known as: Point to Point Protocol over Ethernet

Network protocol for encapsulating PPP (point to point protocol) frames inside Ethernet frames.

PPTP
  • Also known as: Point-to-Point Tunneling Protocol

A network protocol that is used to establish VPN tunnels.

predictive sender profiling

A method of blocking spammers who obfuscate their web identities.

Premium Support

24/7 support, offered by Barracuda Networks

printer spooler
  • Also known as: print spooler

A software process that accepts a print job from a workstation as if it were a printer and then sends the print job to an actual printer at a later time. 

private cloud

Services offered over the Internet or over a private internal network to select users. These services are not available to the general public.

private IP address

Internal IP address that belongs to the address space in a private network.

private subnet

A VPC subnet whose instances cannot be reached from the Internet.

promiscuous mode

In this mode, a network device can receive and process all of the packets on its network. Can be used in packet sniffing. 

protected IP count

The number of IP addresses being protected by the gateway.

protocol object

A firewall object that references protocols. Can be applied to an access rule on the Barracuda CloudGen Firewall.

provisioning

Process of preparing and equipping a network or device to allow it to provide services to its users.

Proxy ARP object
  • Also known as: address resolution protocol

A firewall object with the purpose of letting the Barracuda CloudGen Firewall answer ARP requests on behalf of a remote interface. It can then accept packets and correctly forward packets to the remote host.

PSK
  • Also known as: Pre-Shared Key, preshared key

A shared secret that was previously shared between two parties using a secure channel before it needs to be used.

PST file
  • Also known as: personal storage table

An Outlook Data File. Used for POP3, IMAP, and web-based mail accounts. When you want to create archives or back up your Outlook folders and items on your computer, such as Exchange accounts, you must create and use additional PST files. See also OST file.

public cloud

Cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Examples include Amazon AWS, Google Cloud Platform, and  Microsoft Azure.

public cloud hosting

Cloud-hosted virtual machines, such as Microsoft Azure and Amazon Web Services.

Public DNS

Public Domain Name System (DNS) resolution service.

public IP address

External IP address, assigned to a computing device to allow direct access over the Internet. For example, a web server, email server or any server device directly accessible from the Internet.

public key

A value provided by a designated authority as an encryption key.  Public key cryptography (asymmetric cryptography) uses pairs of keys: public keys that may be distributed widely, and private keys that are known only to the owner.

public key encryption
  • Also known as: asymmetric encryption

Encryption that uses both a public key and a private key as a pair; one is used for encryption, the other is used for decryption.

public subnet

A subnet whose instances can be reached from the Internet.

purging
  • Also known as: purge

Cleaning out inactive or obsolete records or data from the set of active files for archiving or deletion.

PV
  • Also known as: paravirtual virtualization

Allows guest VMs to run on host systems that do not have special support extensions for full hardware and CPU virtualization. Cannot provide hardware-related features such as enhanced networking or GPU support.

Quality of Service
  • Also known as: QoS

Overall performance of the network, especially as seen by the network users. Includes things such as throughput, availability, and error rate.

 

quarantine

Isolating a file suspected of being infected with a virus to a specific area of a system to prevent it from infecting other files.

quiesce

To pause or alter a device or application to achieve a consistent state, usually in preparation for a backup or other maintenance.

RADIUS
  • Also known as: Remote Authentication Dial-In User Service, WiFi Access Point Authentication

Networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

RAID
  • Also known as: redundant array of independent disks

Provides a way of storing the same data in different places (redundantly) on multiple hard disks.

range-specific
  • Also known as: range specific

1. Relating to a set range of values.

2. Global settings that apply to a range on a Barracuda NextGen Control Center.

ransomware

Malicious software designed to block access to computer files or an entire system until a sum of money is paid.

RBL
  • Also known as: Realtime Blackhole List

List of IP addresses whose owners do not stop the proliferation of spam. The owners often have customers who are associated with creating or relaying the spam. 

RDP
  • Also known as: Remote Desktop Protocol

A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.

RDS

AWS term, managed Relational Database Service

real time
  • Also known as: realtime, real-time

The time in which an action is performed.

regular expression

A combination of characters or character classes and operators that describe text for matching purposes.

remote access client

Software that allows access to internal applications and data from remote devices. Example: VPN client, CudaLaunch.

replication

Involves sharing information to ensure consistency between sources. By comparison, backups save data unchanged for a long period of time; replicas undergo frequent updates.

Report Creator
  • Also known as: Barracuda Report Creator

Creates customized reports using statistics and logs collected on Barracuda CloudGen Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates, and a customizable layout and delivery method. 

Reserved Instance

A pricing option for EC2 instances that discounts the on-demand usage charge for instances that meet the specified parameters. Customers pay for the entire term of the instance, regardless of how they use it.

Reserved IP addresses
  • Also known as: RIP

IP addresses reserved for special purposes. For example, IP addresses reserved and assigned to Azure cloud services.

resource group

Group of entities in Azure, that may contain storage accounts for OS disks, source images, application data, and networking resources.

REST
  • Also known as: Representational State Transfer, RESTful

A type of HTTP-based request interface that generally uses only the GET or POST HTTP method and a query string with parameters. Enables interoperability between a computer system and the Internet.

REST API
  • Also known as: Representational State Transfer API

A software architecture style for building scalable web services. REST gives a coordinated set of constraints to the design of components in a distributed hypermedia system that can lead to a higher performing and more maintainable architecture.An API (Application Programming Interface) is the means by which third parties can write code that interfaces with other code.

REST API Interface

Provides remote administration of products including the Barracuda CloudGen Firewall and the Barracuda Web Application Firewall, using JSON-RPC request (get or set variables) corresponding to field values in the configuration database.

retention policy

Rules that determine whether data older than a defined age will be deleted of offloaded to another device or cloud.

reverse lookup zone

Support the secondary function of Domain Name System (DNS) - the resolution of IP addresses to host names.

reverse proxy

The HTTP Proxy directs incoming requests from other servers to clients without providing the origin details.

Revision Control System
  • Also known as: RCS

Allows you to view, revert and keep track of configuration changes on the Barracuda Nextgen Control Center.

RIP
  • Also known as: Routing Information Protocol

Protocol used in dynamic routing. RIP is a distance-vector routing protocol that employs the hop count as a routing metric.

RIP/OSPF/BGP service

Barracuda CloudGen Firewall service that allows dynamic routing configuration.

RMA
  • Also known as: Routing Information Protocol

Numbered authorization provided by a merchant, like Barracuda Networks, to permit the return of a product.

rogue app threats

Forms of Internet fraud using computer malware to trick users into revealing financial and social account details or paying for bogus products. The apps are rogue, because they do not appear to be malicious.

role-based administration
  • Also known as: role based administration

Gives administrators the ability to assign specific privileges to users and to present the user with only the tools and permissions necessary to perform specific tasks, based on their role within the organization.

rollback

A return to a previous state after an installation or configuration failure.

root certificate

A CA-signed or self-signed public key certificate that identifies the root certificate authority (CA).

Round-Robin policy

Method of traffic balancing among links/interfaces in circular order.

Route 53

AWS service for DNS-based load balancing that connects user requests to EC2 instances, ELBs, S3 buckets, and Internet applications and provides health checks for monitoring or to route traffic to healthy endpoints.

route table

In AWS, a set of routing rules that controls the traffic leaving any subnet that is associated with the route table. You can associate multiple subnets with a single route table, but a subnet can be associated with only one route table at a time.

routed bridging

Bridging mode where the router acts as a bridge.

RPC protocols
  • Also known as: Rate Control Protocol, ONC-RPC, DCE-RPC

Congestion control algorithm designed for fast download times such as user response times, or flow-completion times. 

RPC tracking
  • Also known as: remote procedure call tracking

Used to support RPC based services across the firewall. The RPC tracking modules supervise traffic to and from RPC portmapper(s).

RRS

One of the four storage classes in AWS. 99.9& SLA reduced redundancy storage, lower fault tolerance, stored in 1 region.

RSA SecurID

A hardware token for performing two-factor authentication for a user to a network resource.

ruleset

A collection of one or more access or application rules.