Glossary
- 3DES
-
Symmetric-key block cipher used in data encryption that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.
- 802.11n
-
Wireless networking standard that uses multiple antennas to increase data rates.
- 802.1q VLAN
-
IEEE 802.1Q is a standard for virtual LANs (VLANs) on an Ethernet network that defines VLAN tagging for Ethernet frames and frame handling for bridges and switches, and contains provisions for a quality of service prioritization scheme (IEEE 802.1p). It also defines the Generic Attribute Registration Protocol.
- access control list
-
Constrains the flow of traffic by individual IP address or by a range of IP addresses.
- access rule
-
Forwarding rule that determines how clients on a source network access resources on a destination network.
- add-in
-
Software utility that can be used in conjunction with a device or service; for example, Barracuda Outlook Add-In.
- add-on
-
A piece of software that enhances another software application and usually cannot be run independently.
- Advanced Persistent Threat
-
Malicious cyber attacks directed at a specific target, usually over a long period of time. APTs are often run by professional organizations, looking to steal information rather than just money.
- Advanced Threat Protection
-
Service that analyzes inbound email attachments with most MIME types in a separate, secured cloud environment, detecting new threats and determining whether to block such messages. Formerly known as Advanced Threat Detection, or ATD.
- AES 256-bit
-
A specification for the encryption of electronic data. 256-bit refers to the key length and is the maximum value.
- allow list
-
List of domains, users, or hosts that are allowed access, especially referring to mail and web traffic.
- Amazon Web Services
-
Amazon's public cloud platform that lets you build, deploy, and manage applications across a global network of datacenters.
- AMI
-
AWS template that contains configuration, application server, and applications required to launch an EC2 AWS Instance.
- Android
-
Mobile device operating system. Compare to Apple iOS.
- anti-evasion
-
Protection against network attacks that combine several different known evasion methods to create a new technique that is delivered over several layers of the network simultaneously.
- anti-obfuscation
-
Protection against attacks that involve obfuscated code. Obfuscation may involve encrypting code, stripping out potentially revealing metadata, renaming useful class and variable names, or adding meaningless code to an application binary.
- antivirus
-
Antivirus software, abbreviated: AV. Used to prevent, detect and remove malicious software.
- API
-
A set of tools and procedures provided by the programmer of an application so that other programmers can control, exchange data with, or extend the functionality of an application.
- APN
-
Access Point Name provided by an ISP for wireless WAN connections.
- Apple iOS
-
Apple mobile operating system for devices such as iPhone and iPad. Compare to Android.
- appliance
-
Device or piece of equipment.
- Application Load Balancer
-
AWS feature that makes routing decisions at the application layer (HTTP/S), supports path-based routing, and can route requests to one or more ports on each EC2 instance or container instance in a VPC.
- application-aware
-
Considering and inspecting application traffic. The Barracuda NextGen Firewall is an application-aware network firewall.
- ARP
-
Protocol for mapping IP addresses to physical addresses such as Ethernet or Token Ring.
- ARP spoofing
-
Type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.
- ASCII
-
Referring to a standard 7-bit character system that includes the alphanumeric characters and printer control codes.
- authoritative DNS
-
Name server that gives answers in response to queries about names in a DNS zone.
- authority zone
-
Associated with DNS. A section of the domain-name tree for which one name server is the authority.
- Auto Scaling Group
-
A representation of multiple EC2 instances that share similar characteristics, and that are treated as a logical grouping for the purposes of instance scaling and management.
- autonomous system
-
Collection of networks under a common administration sharing a common routing strategy. Autonomous systems are subdivided by areas. An autonomous system must be assigned a unique 16-bit number by the IANA.
- AWS Certificate Manager
-
A web service for provisioning, managing, and deploying Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services.
- AWS Direct Connect
-
Enables you to use the Internet privately through AWS cloud services by linking your internal network to an AWS Direct Connect location. You can create virtual interfaces directly to the AWS cloud and to Amazon VPC, bypassing Internet service providers in your network path.
- AWS IoT
-
A managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.
- AWS region
-
A named set of AWS resources in the same geographical area. A region comprises at least two Availability Zones.
- AWS Management Console
-
A simple and intuitive web-based user interface to access and manage AWS.
- Azure
-
Microsoft's public cloud platform that lets you build, deploy, and manage applications across a global network of datacenters.
- back-end server
-
Part of the back-end process, that usually consists of server, application, and database. The back end is where the technical processes happen, as opposed to the front end, which is usually where the user's interaction occurs.
- backbone
-
Referring to the Internet, a central network that provides a pathway for other networks to communicate.
- Balance-XOR
-
Operating mode for Ethernet bundles where the link is chosen by calculating the hash out of the source/destination MAC (Layer 2) combined with the IP addresses (Level 3).
- bandwidth
-
Rate of data transfer, usually expressed in multiples of bits per second (bps).
- Barracuda Campus
-
Online documentation and training material for all Barracuda Networks products, located at campus.barracuda.com. Contains feature descriptions, how-to articles, and release notes. Formerly known as Barracuda University and Barracuda TechLibrary.
- Barracuda Central
-
Provides a wide range of statistics, threat information, and a number of useful services to help manage and secure your network. Shares information with Barracuda Networks customers and the Internet security community.
- Barracuda cloud
-
A complementary component of all Barracuda Networks products, providing an added layer of protection and scalability.
- Barracuda Cloud Control
-
A comprehensive cloud-based service that enables administrators to monitor and configure multiple Barracuda Networks products from a single console.
- Barracuda CloudGen Firewall
-
Enterprise-grade, cloud-generation firewall, purpose-built for efficient deployment and operation within dispersed, highly dynamic, and security-critical network environments.The product was formerly known as Barracuda NextGen Firewall or Barracuda NG Firewall and in Q1 2018 got renamed to CloudGen Firewall to emphasize its abilities to protect cloud and dispersed networks.
- Barracuda Networks account
-
Credentialed account used to log into Barracuda Services and Barracuda Appliance Control.
- Barracuda Networks Technical Support
-
Contact Barracuda Networks Technical Support if you need help with your Barracuda Networks product. Visit https://www.barracuda.com/support/index for details.
- Barracuda NextGen Firewall X-Series
-
Application-aware network firewall appliance, designed for organizations without dedicated IT personnel to manage firewalls.
- Barracuda NG Web Security Gateway (IBM ISS)
-
Web Security Gateway engine used by the URL Filter service on the Barracuda NextGen Firewall F-Series. The Barracuda NG Web Security Filter can only be used in combination with the HTTP proxy and is not compatible with Application Control. Requires a Barracuda NG Web Security Gateway subscription.
- Barracuda portal
-
Entry point into Barracuda cloud services.
- Barracuda SSL VPN
-
Allows remote users to establish VPN connections via a web browser. With its mobile and desktop portals, the Barracuda SSL VPN provides seamless service without having to install and configure a fully blown VPN client. SSL VPN is also available on the Barracuda Firewall and NG Firewall.
- Barracuda VPN Client
-
Component of the Barracuda Network Access Client, available for Windows, Linux and macOS. VPN client that secures mobile desktops connecting to the corporate LAN through the Internet.
- BIND
-
The standard TCP/IP naming service that links network names with IP addresses.
- block device
-
Storage device that moves data in sequences of bytes or bits (blocks). Example: hard disk, CD-ROM drive, flash drive.
- block device mapping
-
Defines the block devices (instance store volumes and EBS volumes) to attach to an AWS instance.
- Blowfish
-
Licence-free symmetric encryption algorithm that can be used as a replacement for the DES and IDEA algorithms.
- bridging
-
The action taken by network equipment to create an aggregate network from either two or more communication networks, or two or more network segments. Bridging is distinct from routing, which allows multiple different networks to communicate independently while remaining separate.
- byte-level data deduplication
-
Data deduplication method that analyzes data streams at the byte level by performing a byte-by-byte comparison of new data streams versus previously stored ones.
- CAST
-
Licence-free symmetric encryption algorithm (key block cipher).
- central management
-
Allows administrators to configure multiple units from a centralized location. For example, configuring multiple Barracuda CloudGen Firewall units from the Barracuda Firewall Control Center.
- certificate
-
A document or seal certifying the authenticity of something. A digital certificate certifies the ownership of a public key. This allows relying parties to rely upon signatures or on assertions made about the private key that corresponds to the certified public key.
- changelog
-
Log of configuration changes on the appliance. Can be found in the release notes of the product.
- checksum
-
The result of a mathematical operation that uses the binary representation of a group of data as its basis, usually to check the integrity of the data.
- CIDR
-
Technique supported by BGP4 and based on route aggregation. CIDR allows routers to group routes together in order to cut down on the quantity of routing information carried by the core routers.
- Class A|B|C|D network
-
Classes of IP addresses as defined in the Internet Protocol hierarchy.
- classic load balancer
-
In AWS, a Classic Load Balancer makes routing decisions at either the transport layer (TCP/SSL) or the application layer (HTTP/HTTPS), and supports either EC2-Classic or a VPC (virtual private cloud).
- Client-to-Site VPN
-
Enables an encrypted connection to an organization's network from any desktop or mobile device. Contrast with site-to-site VPN.
- cloud integration
-
AWS cloud integration allows the firewall to connect directly to the AWS service fabric to rewrite routes in AWS route tables and to retrieve information for the cloud element on the dashboard. Cloud integration also works with Azure.
- cloud operating system
-
A computer operating system that is specially designed to run in a provider's datacenter and be delivered to the user over the Internet or another network. Windows Azure is an example of a cloud operating system or 'cloud layer' that runs on Windows Server 2008.
- cloud portability
-
The ability to move applications and data from one cloud provider to another. This is the opposite of "vendor lock-in".
- cloud-based encryption
-
A service offered by cloud storage providers whereby data is transformed using encryption algorithms and is then placed on a storage cloud.
- Cloud-Generation Firewall
-
Integrated network platform that combines a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed.
- CloudFormation
-
AWS management tool that lets you create, manage, and update a collection of AWS resources using templates and allowing Json code for template deployment.
- CloudFront
-
An AWS content delivery service that helps you improve the performance, reliability, and availability of your websites and applications.
- cloudsourcing
-
Replacing traditional IT operations with lower-cost, outsourced cloud services.
- CloudWatch
-
AWS management tool to monitor resources and applications. Aggregates data and metrics (cpu load, network throughput, disk io, etc), filters it, and provides alarm actions.
- cluster-specific
-
Global settings that apply to a cluster on a Barracuda NextGen Control Center.
- collision domain
-
In Ethernet, the network area within which frames that have collided are propagated. Repeaters and hubs propagate collisions. LAN switches, bridges and routers do not.
- congestion
-
Traffic in excess of network capacity.
- connection draining
-
AWS feature, lets you scale down EC2 instances to reduce sessions.
- connection object
-
A firewall object that can be applied to an access rule on the Barracuda CloudGen Firewall. A connection object defines the egress interface and source (NAT) IP address for traffic matching the rule.
- CPU emulation
-
Masks the virtualization environment, so payload can be detonated more effectively.
- cross region replication
-
Feature of S3 storage class in AWS. Once enabled, every object uploaded to a particular S3 bucket is automatically replicated to a designated destination bucket located in a different AWS region.
- CudaLaunch
-
Barracuda remote access client for mobile and desktop devices that provides VPN access and allows administrators to manage dynamic firewall rules.
- data center
-
A facility used to house computer systems and associated components, such as telecommunications and storage systems.
- data truncation
-
Occurs when data or a data stream is stored in a location too short to hold its entire length. May occur automatically, such as when a long string is written to a smaller buffer, or deliberately, when only a portion of the data is wanted.
- datasheet
-
Document that summarizes the performance and other technical characteristics of a product, machine, component (e.g., an electronic component), material, a subsystem (e.g., a power supply) or software in sufficient detail to be used by a design engineer to integrate the component into a system.
- DCE-RPC
-
Remote procedure call system that allows programmers to write distributed software without having to worry about the underlying network code.
- dedicated host
-
An Internet hosting option where an organization leases an entire server, fully dedicated to their use. This is also an option in the public cloud. The price for a Dedicated Host varies by instance family, region, and payment option.
- dedicated instance
-
Amazon EC2 instance that runs on single-tenant hardware dedicated to a single customer.
- dedicated reserved instance
-
An option you can purchase from a cloud vendor to guarantee that sufficient capacity will be available to launch Dedicated Instances into a virtual private cloud (VPC).
- demilitarized zone
-
A physical or logical sub-network that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN). An external network node has direct access only to equipment in the DMZ, rather than to any other part of the network.
- destination NAT
-
Changing the destination address/port in the IP header of a packet. Example: redirecting incoming packets with a destination of a public address/port to a private IP address/port inside the network.
- DNS
-
Distributed database that translates domain names, like www.example.com, into unique IP address.
- DNS Cache
-
A temporary database, maintained by a computer's operating system, that contains records of all recent visits and attempted visits to websites and other Internet domains.
- DNS record
-
Database record used to map a URL to an IP address.
- DNS reputation filtering
-
Filtering mail traffic based on a DNS reputation database. Used by the Spam Filter service (blacklist, DNSBL).
- Docker
-
Open-source software that automates the deployment of applications inside virtualized software containers.
- Docker image
-
A layered file system template that is the basis of a Docker container. Docker images can comprise specific operating systems or applications.
- dynamic path selection
-
Term used in context with Traffic Intelligence (TI). Using dynamic path selection, the session is balanced depending on the amount of traffic.
- dynamic routing
-
Routing that adjusts automatically to network topology or traffic changes. Also called adaptive routing.
- DynamoDB
-
A fully managed Amazon NoSQL database service that provides fast and predictable performance with seamless scalability.
- edge location
-
Used by the AWS service CloudFront. Feature that offers content to end users via geographically closer locations to improve their experience.
- EGP
-
Internet protocol for exchanging routing information between autonomous systems.
- Elastic Beanstalk
-
A web service for deploying and managing applications in the AWS cloud without worrying about the infrastructure that runs those applications.
- Energize Updates
-
Provides Barracuda Networks products with protection from the latest Internet threats. These updates are sent out hourly, or more frequently if needed, to ensure that appliances always have the latest and most comprehensive protection. Barracuda Energize Updates subscriptions must be purchased with any Barracuda Networks appliance. Includes basic support, firmware maintenance, security updates, and early release firmware.
- envelope encryption
-
The use of a master key and a data key to algorithmically protect data. The master key is used to encrypt and decrypt the data key and the data key is used to encrypt and decrypt the data itself.
- Ethernet
-
Local area network technology that uses special twisted pair or fiber optical cables. As per the OSI model, Ethernet provides services up to and including the data link layer.
- EULA
-
Contract between the Barracuda and the purchaser, establishing the purchaser's right to use Barracuda software.
- evasion
-
Bypassing an information security device in order to deliver an exploit, attack, or other form of malware to a target network or system, without detection.
- exploit
-
The use of software, data, or commands to 'exploit' a weakness in a computer system or program to carry out some form of malicious intent, such as a denial-of-service attack, Trojan horses, worms, or viruses.
- firewall object
-
A named collection that represents specific networks, services, applications, user groups, or connections for reference in access rules on the Barracuda CloudGen Firewall.
- firmware
-
Model version of a Barracuda Networks product.
- flooding
-
A Denial of Service (DoS) attack that is designed to bring a network or service down by flooding it with large amounts of traffic.
- Flow Logs
-
AWS service that enables you to capture information about the IP traffic going to and from network interfaces in a VPC.
- forensics
-
Techniques of examining digital media with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital information.
- forward proxy
-
An intermediary for requests from clients under an administrator's control to areas that are not under the administrator's control. Sometimes called "proxy" without the word "forward".
- Forwarding Firewall service
-
Configurable firewall service of the Barracuda CloudGen Firewall. The Forwarding Firewall service can be added to every virtual server.
- FQDN
-
The Fully Qualified Domain Name includes host name, as well as all enclosing domains, and is often distinguished by the use of a terminating dot: (host.subdomain.domain.).
- FTP
-
Standard network protocol used to transfer files between a client and server on a computer network.
- FTP proxy
-
Allows the proxy to control FTP traffic. When a client uploads or downloads files, the proxy identifies the traffic as FTP, allowing the appliance to control file transfers using TCP optimization and caching.
- FTPS
-
Extension to FTP that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
- full duplex
-
A communication system between two entities in which either entity can transmit simultaneously. Compare to half duplex.
- Gb
-
A gigabit, or 10^9 bits.
- GB
-
A gigabyte, or 10^9 bytes, or 8000 million bits.
- generic forwarding
-
With generic forwarding, requests from networks are forwarded without any firewall intervention even if the firewall is switched off.
- GHz
-
A unit of frequency equal to 10^9 hertz, which is defined as one cycle per second.
- Google Accounts Enforcement
-
Integration of Google Accounts, for example in authentication processes.
- Google App Engine
-
A service that enables developers to create and run web applications on Google's infrastructure and share their applications via a pay-as-you-go, consumption-based plan with no setup costs or recurring fees.
- guest access
-
Feature that lets you set up a confirmation page or ticketing system to temporarily grant guests access to the network.
- H.323
-
Standard that defines the protocols to provide audio-visual communication sessions on any packet network. H.323 addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multi-point conferences.
- hardware refresh
-
Barracuda program that allows existing appliance customers with an active Energize Updates subscription to migrate to the latest hardware platforms at a reduced price -- ensuring customers benefit from the latest hardware improvements and firmware capabilities.
- high availability
-
Deployment method that ensures that the services running on the system are always available even if one system is down due to maintenance or a hardware fault.
- hostname
-
Label assigned to a device connected to a computer network. Used to identify the device in various forms of electronic communication.
- HTTP
-
Protocol for submitting data over a network, commonly used to load website content in a web browser.
- HTTPS
-
Consists of communication over HTTP within a connection encrypted by TLS or SSL. The main motivation is authentication of the visited website and protection of the privacy and integrity of the exchanged data.
- Infrastructure Services
-
Infrastructure is the backbone of all of your business operations.
- Intrusion Detection System
-
Network security feature that monitors local and forwarding firewall traffic for malicious activities.
- Intrusion Prevention System
-
Configurable network security feature that monitors local and forwarding firewall traffic for malicious activities.
- IPv4, IPv6
-
The fourth and sixth versions, respectively, of the Internet Protocol (IP). Following are examples of notation for each type of address:IPv4 192.0.2.235IPv6 2001:0db8:0000:0042:0000:8a2e:0370:7334
- IS
-
Routing node in an OSI network.
- ISAKMP
-
Protocol defined by RFC 2408 for establishing Security Associations (SA) and cryptographic keys in an Internet environment. It is part of IKE.
- ISDN
-
Communication protocol offered by telephone companies that permits telephone networks to carry data, voice, and other source traffic.
- ISP
-
Organization that provides access to the Internet.
- jitter
-
Measure of the difference in packet delay, that is, the difference in the space between packet arrival times. Jitter can be remedied somewhat with a jitter buffer.
- kb
-
A kilobit.
- Launch Configuration
-
AWS template that an Auto Scaling group uses to launch EC2 instances. Contains AMI, instance type, key pair, security groups, and block device mapping.
- Layer 7 Application Control
-
A legacy feature of the Barracuda NG Firewall. Barracuda Networks recommends using the new Application Control in Barracuda NextGen Firewall instead.
- LDAPS
-
Connection protocol used between application and Network Directory or Domain Controller. LDAPS communication is encrypted and secure.
- legacy
-
Latest maintenance release for the previous major firmware version.
- link state routing
-
A routing protocol that takes link loading and bandwidth when selecting between alternate routes. Example: OSPF.
- macOS
-
Macintosh Operating System. Formerly known as Mac OS X.
- Mb
-
A megabit.
- MBPS
-
A unit of measure used to describe the rate of data transmission equal to one millions bits per second.
- mesh network
-
A network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.
- MHz
-
A unit of frequency equal to 10^6 hertz, which is defined as one cycle per second.
- MIB
-
A database used for managing the entities in a communication network. Often associated with SNMP.
- Microsoft Azure
-
Microsoft's cloud computing platform. Barracuda Networks was the first Microsoft Azure Certified Security Solution Provider, with a product line that includes the Barracuda Web Application Firewall, CloudGen Firewall, Message Archiver, and Email Security Gateway.
- MIME type
-
Two-part identifier for file formats and format contents transmitted over the Internet.
- MOS
-
Measure representing the overall quality of a system or stimulus, calculated by taking the arithmetic mean of individual values of quality. Often used for, but not limited to, video, audio and audiovisual quality.
- MS-CHAP
-
Protocol used to authenticate VPN clients over L2TP/PPTP or to authenticate HTTP Proxy users.
- MTA
-
Software that transports email messages from one computer to another by using a client-server architecture.
- MTU
-
A specification in a data link protocol that defines the maximum number of bytes that can be carried in any one packet on that link.
- multilayer switch
-
Switch that filters and forwards packets based on MAC addresses and network addresses. A subset of LAN switch.
- multiplexing
-
Scheme that allows multiple logical signals to be transmitted simultaneously across a single physical channel.
- multitenancy
-
The existence of multiple clients sharing resources (services or applications) on distinct physical hardware. Due to the on-demand nature of cloud, most services are multitenant.
- name server
-
Server connected to a network that resolves network names into network addresses.
- NAT
-
The process of modifying IP address information in IP packet headers while in transit across a traffic routing device. The simplest type of NAT provides a one to one translation of IP addresses.
- NAT instance
-
A NAT device, configured by a user, that performs network address translation in a VPC public subnet to secure inbound Internet traffic.
- NAT Traversal
-
A computer networking methodology with the goal to establish and maintain Internet protocol connections across gateways that implement network address translation (NAT). NAT breaks the principle of end-to-end connectivity originally envisioned in the design of the Internet.
- NetBIOS
-
API used by applications on an IBM LAN to request services from lower-level network processes. These services might include session establishment and termination, and information transfer.
- Network Access Client
-
Barracuda Networks product that integrates with the Access Control Service and lets you configure access policies and rules depending identity and client health state. The NAC Client consists of Barracuda Personal Firewall, Barracuda Access Monitor, and Barracuda VPN Client.
- network object
-
A firewall object on the Barracuda CloudGen Firewall that references networks, IP addresses, hostnames, or interfaces. Network objects can be applied to access rules.
- Network Time Protocol
-
Networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.
- NextGen Remote
-
Software that provides system administrators remote access to F-Series Firewalls and Control Centers through their iOS device.
- NG Control Center
-
A central administration appliance designed to manage a large number of Barracuda NG Firewalls.
- non-stub area
-
Resource-intensive OSPF area that carries a default route, static routes, intra-area routes, interarea routes, and external routes. The only OSPF areas that can have virtual links configured across them and that can contain an ASBR.
- NoSQL
-
Nonrelational database systems that are highly available, scalable, and optimized for high performance. Instead of the relational model, NoSQL databases (like Amazon DynamoDB) use alternate models for data management, such as keyvalue pairs or document storage.
- NTLM
-
A suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.
- null ciphers
-
Form of encryption where the plaintext is mixed with a large amount of non-cipher material.
- offline authentication
-
Authentication method with an internal IP address as destination. Offline Authentication Works with all protocols (for example, POP3).
- offsite
-
Refers to a location other than the subject site. Example: Barracuda Cloud Storage subscription plans provide diverse offsite storage that scales to meet your changing data requirements.
- On-Demand Instance
-
An Amazon EC2 pricing option that charges you for compute capacity by the hour with no long-term commitment.
- ONC-RPC
-
Remote procedure call system based on calling conventions used in Unix and the C programming language.
- onsite
-
At the place where a business or activity happens. Compare to offsite.
- OpenStack
-
A free and open-source cloud computing software platform used to control pools of processing, storage, and networking resources in a datacenter.
- OSB transformation
-
Orthogonal sparse bigram transformation. In machine learning, a transformation that aids in text string analysis and that is an alternative to the n-gram transformation. OSB transformations are generated by sliding the window of size n words over the text, and outputting every pair of words that includes the first word in the window.
- OSPF
-
A dynamic routing protocol. OSPF is a link state protocol that uses Dijkstra algorithm to calculate the shortest path tree.
- PaaS
-
Cloud platform services, where the computing platform (operating system and associated services) is delivered as a service over the Internet by the provider.
- packet
-
A unit of data routed between an origin and a destination over a network.
- packet fragmentation
-
Part of the processing of TCP IP traffic that consists of fragmenting, sending, and reassembling packets.
- padding
-
Additional, meaningless data adds to a packet to increase its size.
- passphrase
-
Series of characters that must be provided by the user for input to the cryptographic key generation process. Must be no less than eight logical characters and can contain spaces.
- PAT
-
Conserves IP addresses by permitting multiple devices on a local network to be mapped to a single public IP address. An extension to network address translation (NAT).
- PAYG
- peer
-
A device to which a computer has a network connection that is relatively symmetrical and where both devices can initiate or respond to a similar set of requests.
- persistent storage
-
A data storage solution where the data remains intact until it is deleted.
- Personal Firewall
-
Component of the Barracuda Network Access Client. Centrally managed host firewall that can handle up to four different rulesets at once, depending on the policy applicable to user, machine, date, and time
- PKCS #n
-
Refers to a group of standards, in the format PKCS #n, where n =1 to 15. For example: Certificates can be downloaded in PKCS #12 format, which includes the private key and certificate.
- PKI
-
A system for distributing and using public encryption keys, enabling secure data exchange over the Internet.
- Placement Group
-
Logical grouping of AWS instances within a single Availability Zone.
- policy routing
-
Also called source-based routing, is used when the source IP address of the connection determines, in part or completely, which route is used.
- policy simulator
-
A tool in the IAM AWS Management Console that helps you test and troubleshoot policies so you can see their effects in real-world scenarios.
- polling
-
A means of Media Access Control where a device may only transmit information when it is given permission to transmit by a controller device.
- PPPoE
-
Network protocol for encapsulating PPP (point to point protocol) frames inside Ethernet frames.
- PPTP
-
A network protocol that is used to establish VPN tunnels.
- Premium Support
-
24/7 support, offered by Barracuda Networks
- private subnet
-
A VPC subnet whose instances cannot be reached from the Internet.
- provisioning
-
Process of preparing and equipping a network or device to allow it to provide services to its users.
- Proxy ARP object
-
A firewall object with the purpose of letting the Barracuda CloudGen Firewall answer ARP requests on behalf of a remote interface. It can then accept packets and correctly forward packets to the remote host.
- PSK
-
A shared secret that was previously shared between two parties using a secure channel before it needs to be used.
- public IP address
-
External IP address, assigned to a computing device to allow direct access over the Internet. For example, a web server, email server or any server device directly accessible from the Internet.
- public subnet
-
A subnet whose instances can be reached from the Internet.
- Quality of Service
-
Overall performance of the network, especially as seen by the network users. Includes things such as throughput, availability, and error rate.
- RADIUS
-
Networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.
- RAID
-
Provides a way of storing the same data in different places (redundantly) on multiple hard disks.
- RDP
-
A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.
- RDS
-
AWS term, managed Relational Database Service
- real time
-
The time in which an action is performed.
- regular expression
-
A combination of characters or character classes and operators that describe text for matching purposes.
- Report Creator
-
Creates customized reports using statistics and logs collected on Barracuda CloudGen Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates, and a customizable layout and delivery method.
- Reserved Instance
-
A pricing option for EC2 instances that discounts the on-demand usage charge for instances that meet the specified parameters. Customers pay for the entire term of the instance, regardless of how they use it.
- Reserved IP addresses
-
IP addresses reserved for special purposes. For example, IP addresses reserved and assigned to Azure cloud services.
- reverse lookup zone
-
Support the secondary function of Domain Name System (DNS) - the resolution of IP addresses to host names.
- reverse proxy
-
The HTTP Proxy directs incoming requests from other servers to clients without providing the origin details.
- RMA
-
Numbered authorization provided by a merchant, like Barracuda Networks, to permit the return of a product.
- rollback
-
A return to a previous state after an installation or configuration failure.
- root certificate
-
A CA-signed or self-signed public key certificate that identifies the root certificate authority (CA).
- Round-Robin policy
-
Method of traffic balancing among links/interfaces in circular order.
- Route 53
-
AWS service for DNS-based load balancing that connects user requests to EC2 instances, ELBs, S3 buckets, and Internet applications and provides health checks for monitoring or to route traffic to healthy endpoints.
- route table
-
In AWS, a set of routing rules that controls the traffic leaving any subnet that is associated with the route table. You can associate multiple subnets with a single route table, but a subnet can be associated with only one route table at a time.
- routed bridging
-
Bridging mode where the router acts as a bridge.
- RPC protocols
-
Congestion control algorithm designed for fast download times such as user response times, or flow-completion times.
- RRS
-
One of the four storage classes in AWS. 99.9& SLA reduced redundancy storage, lower fault tolerance, stored in 1 region.
- ruleset
-
A collection of one or more access or application rules.
- S3
-
Object-based, scalable object storage in the AWS cloud.
- SaaS
-
Software licensing and delivery system in which software is licensed on a subscription basis and is centrally hosted.
- SafeSearch
-
Feature of Google Search that acts as an automated filter of pornography and potentially offensive content.
- Salesforce
-
An online SaaS company that is best known for delivering customer relationship management (CRM) software to companies over the Internet.
- scalability
-
The suitability of a network system to operate properly and efficiently when configured on a large scale.
- SCCP
-
Network layer protocol that provides extended routing, flow control, segmentation, connection orientation, and error correction facilities in Signaling System 7 telecommunications networks.
- SD-WAN
-
A wide area network controlled by software. Control and data are decoupled, simplifying both network hardware and management.
- serial port
-
A port on a computing device that is capable of either transmitting or receiving one bit at a time.
- service certificate
-
Certificate for a service, signed by a valid, trusted entity, that allows access without further validation.
- session layer
-
The layer in the OSI 7-Layer Model that is concerned with managing the resources required for the session between two computers.
- single pass
-
Algorithm that reads its input exactly once, in order, without unbounded buffering. Generally requires O(n) time and less than O(n) storage (typically O), where n is the size of the input.
- Single Sign-On
-
A session and user authentication service that permits a user to use one set of login credentials to access multiple applications.
- SIP
-
Communications protocol for signaling and controlling multimedia communication session such as voice and video calls.
- SIP Proxy service
-
In VoIP (Voice over Internet Protocol) technology, SIP proxies are elements that route SIP requests to user agent servers and SIP responses to user agent clients. The SIP Proxy service on the Barracuda NextGen Firewall helps establish a VOIP call with an external SIP provider.
- Site-to-Site VPN
-
Securely connects entire networks to each other, for example, connecting a branch office network to a company headquarters network.
- SLA
-
A contractual agreement by which a service provider defines the level of service, responsibilities, priorities, and guarantees regarding availability, performance, and other aspects of the service.
- SMB
-
Operates as an application-layer network protocol mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network.
- SMS Passcode
-
Multi-Factor Authentication (MFA) solution that adds an extra security layer for a broad range of authentication clients.
- SMTP
-
Internet standard for electronic mail transmission.
- SNA
-
IBM's communications architecture and strategy.
- snapshot
-
Capture of the state of a system at a particular point in time.
- SNMP
-
A standard for management of networked devices using a simple request-response data retrieval mechanism. Used for collecting information, along with configuring network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.
- SNMP service
-
The SNMP service is used to remotely monitor the network and system state of a Barracuda NextGen Firewall using a network management system (NMS).
- SNS
-
Feature to push notifications to mobile services and trigger actions, in Amazon Web Services (AWS).
- SNTP
-
Network package format for time synchronization, similar to NTP, only recommended for simple applications.
- Source NAT
-
Changing the source address/port in the IP header of a packet. Example: changing a private IP address/port into a public address/port in the IP header of a packet leaving the network.
- SpamAssassin
-
Mail filter that is integrated in the Barracuda NextGen Firewall SPAM Filter service.
- SPF
-
A protocol enabling the owner of an Internet domain to specify which computers are authorized to send mail with envelope-from addresses from their own domain.
- Spot Instance
-
Purchasing option that allows a customer to purchase unused Amazon EC2 computer capacity at a highly-reduced rate.
- SQS
-
Amazon Simple Queue Service (SQS) is a fast, reliable, scalable, fully managed message queuing service.
- SSD
-
A solid-state storage device that uses integrated circuit assemblies as memory to store data persistently.
- SSL
-
Standard security technology for establishing an encrypted link between a server and a client - typically a web server and a browser, or a mail server and a mail client.
- SSL certificate
-
A digital certificate that is installed on a web server, authenticates the identity of the website, and encrypts the data that is transmitted.
- SSL Encryption
-
The standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.Transport Layer Security (TLS) is the successor to SSL, and is sometimes referred to as "SSL".
- SSL Inspection
-
SSL Inspection transparently unencrypts, inspects, and and re-encrypts HTTPS traffic. Also has the ability to block a small section of an HTTP site (for example, allowing Google traffic, but blocking Google Play).
- SSL VPN client
-
VPN client that can be installed on the Barracuda CloudGen Firewall and then accessed through the Barracuda SSL VPN web portal. (Barracuda SSL VPN is a different product.)
- static website hosting
-
Hosting of a static website in Amazon S3. When a bucket is enabled for Static website hosting, all content is accessible to web browsers via the Amazon S3 website endpoint of the bucket.
- stream and packet compression
-
Data compression technique used in wireless networks.
- subnetting
-
Partitioning of an IP address space into several smaller address spaces.
- syslog streaming
-
Method for handling of log file messages that are to be transferred to another system for analyzing purposes.
- tap
-
An intrusion into a network cable by a connector.
- TCP Proxy
-
The TCP Proxy is placed between browser and web server and filters requests and responses in TCP streams.
- TCP/IP
-
A Transport and Network Layer Protocol, respectively, used for communication in the Internet and often in private networks.
- Telnet
-
A protocol to access a remote computer system, often a Unix system, over the network. Origin: Teletype Network.
- terminal server
-
Communications processor that connects asynchronous devices such as terminals, printers, hosts, and modems to any LAN or WAN that uses TCP/IP, X.25, or LAT protocols.
- TFTP
-
A simplified version of FTP (file tranfer protocol).
- throttling
-
The automatic restricting or slowing down of a process based on one or more limits.
- timestamp
-
A date/time string to mark an occurrence of an event.
- Traffic Prioritization
-
A WAN optimization technique that allows a certain amount of available bandwidth for mission critical applications and traffic. See also Traffic Shaping.
- transparent proxy
-
The HTTP Proxy operates transparently to the clients in the network.
- Transport Layer Security
-
Cryptographic protocol that provides communications security over a computer network.
- unencrypt
-
To decrypt encrypted data. The antonym of encrypt.
- unit
-
Product or system.
- User Identity Awareness
-
Security term for traffic monitoring based on username, host, and IP address.
- vertical cloud
-
A cloud computing environment optimized for use and built around the compliance needs of specialized industries such as healthcare, financial services, and government operations.
- virtualization
-
Allows multiple guest virtual machines (VM) to run on a host operating system. Guest VMs can run on one or more levels above the host hardware, depending on the type of virtualization.
- VoIP
-
A standard for voice communication over IP networks.
- VPC
-
An elastic network populated by infrastructure, platform, and application services that share common security and interconnection.
- VPN Client
-
An end device, software, or user that is seeking connection, network or data services from a VPN.
- Vx
-
Specifies virtual model of a Barracuda Networks products. For example, Barracuda Web Application Firewall 460 Vx.
- WAN
-
A network connecting devices separated by large geographical distances, often joining multiple local access networks (LANs).
- WAN IP address
-
IP address used to connect your WAN to the Internet. It is shared by all devices in the WAN.
- Web 2.0
-
Term for a second generation of the World Wide Web, focused on the ability for people to collaborate and share information online. Web 2.0 describes World Wide Web sites that emphasize user-generated content, usability, and interoperability.
- web interface
-
Web-based user interface.
- web server
-
A computer system that processes requests via HTTP, the basic network protocol used to distribute information on the web.
- WebDAV
-
Extension of HTTP that enables clients to perform remote web content authoring operations.
- Wi-Fi
-
A technology for wireless local area networking with devices based on the IEEE 802.11 standards.
- wireless access point
-
A device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.
- xDSL
-
An xDSL connection is a tunneled connection using Point-to-Point Protocol over Ethernet (PPPoE) or Point-to-Point Tunneling Protocol (PPTP), depending on your ISP.
- YAML
-
A human-readable data serialization language, commonly used for configuration files.
- zero-day
-
Vulnerability exploited by hackers before it is known to the vendor.