Back to Barracuda Web Application Firewall
Glossary
- accelerator
-
A hardware addition to an existing computing device that increases the computer's processing speed and capabilities.
- access control list
-
Constrains the flow of traffic by individual IP address or by a range of IP addresses.
- access rule
-
Forwarding rule that determines how clients on a source network access resources on a destination network.
- ActiveSync
-
Enables you to configure Microsoft Exchange accounts on a mobile device.
- adaptive profiling
-
Technique of analyzing request and response traffic to generate customized security profiles for the web application. See also exception profiling.
- add-in
-
Software utility that can be used in conjunction with a device or service; for example, Barracuda Outlook Add-In.
- add-on
-
A piece of software that enhances another software application and usually cannot be run independently.
- address mapping
-
Technique that allows different protocols to interoperate by translating addresses from one format to another.
- Advanced Persistent Threat
-
Malicious cyber attacks directed at a specific target, usually over a long period of time. APTs are often run by professional organizations, looking to steal information rather than just money.
- Advanced Threat Protection
-
Service that analyzes inbound email attachments with most MIME types in a separate, secured cloud environment, detecting new threats and determining whether to block such messages. Formerly known as Advanced Threat Detection, or ATD.
- AES 256-bit
-
A specification for the encryption of electronic data. 256-bit refers to the key length and is the maximum value.
- Amazon Web Services
-
Amazon's public cloud platform that lets you build, deploy, and manage applications across a global network of datacenters.
- AMI
-
AWS template that contains configuration, application server, and applications required to launch an EC2 AWS Instance.
- Android
-
Mobile device operating system. Compare to Apple iOS.
- anti-evasion
-
Protection against network attacks that combine several different known evasion methods to create a new technique that is delivered over several layers of the network simultaneously.
- anti-obfuscation
-
Protection against attacks that involve obfuscated code. Obfuscation may involve encrypting code, stripping out potentially revealing metadata, renaming useful class and variable names, or adding meaningless code to an application binary.
- antivirus
-
Antivirus software, abbreviated: AV. Used to prevent, detect and remove malicious software.
- API
-
A set of tools and procedures provided by the programmer of an application so that other programmers can control, exchange data with, or extend the functionality of an application.
- APN
-
Access Point Name provided by an ISP for wireless WAN connections.
- Apple iOS
-
Apple mobile operating system for devices such as iPhone and iPad. Compare to Android.
- appliance
-
Device or piece of equipment.
- application layer
-
Layer 7 of the OSI reference model. This layer provides services to application processes (such as electronic mail, file transfer, and terminal emulation) that are outside of the OSI model.
- Application Load Balancer
-
AWS feature that makes routing decisions at the application layer (HTTP/S), supports path-based routing, and can route requests to one or more ports on each EC2 instance or container instance in a VPC.
- application rule
-
Firewall rule that allows you to block or throttle traffic for detected applications.
- ARP
-
Protocol for mapping IP addresses to physical addresses such as Ethernet or Token Ring.
- ARP spoofing
-
Type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.
- ASCII
-
Referring to a standard 7-bit character system that includes the alphanumeric characters and printer control codes.
- authoritative DNS
-
Name server that gives answers in response to queries about names in a DNS zone.
- authority zone
-
Associated with DNS. A section of the domain-name tree for which one name server is the authority.
- Auto Scaling
-
A web service designed to launch or terminate AWS instances automatically based on user-defined policies, schedules, and health checks.
- Auto Scaling Group
-
A representation of multiple EC2 instances that share similar characteristics, and that are treated as a logical grouping for the purposes of instance scaling and management.
- autonomous system
-
Collection of networks under a common administration sharing a common routing strategy. Autonomous systems are subdivided by areas. An autonomous system must be assigned a unique 16-bit number by the IANA.
- Availability Zone
-
A distinct location within an AWS region that is insulated from failures in other Availability Zones, and provides inexpensive, low-latency network connectivity to other Availability Zones in the same region.
- AWS Direct Connect
-
Enables you to use the Internet privately through AWS cloud services by linking your internal network to an AWS Direct Connect location. You can create virtual interfaces directly to the AWS cloud and to Amazon VPC, bypassing Internet service providers in your network path.
- AWS IoT
-
A managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.
- AWS region
-
A named set of AWS resources in the same geographical area. A region comprises at least two Availability Zones.
- AWS Management Console
-
A simple and intuitive web-based user interface to access and manage AWS.
- Azure
-
Microsoft's public cloud platform that lets you build, deploy, and manage applications across a global network of datacenters.
- Azure Resource Manager
-
Azure deployment mode that enables you to work with the resources in your solution as a group. Recommended for new deployments.
- back-end server
-
Part of the back-end process, that usually consists of server, application, and database. The back end is where the technical processes happen, as opposed to the front end, which is usually where the user's interaction occurs.
- backbone
-
Referring to the Internet, a central network that provides a pathway for other networks to communicate.
- Balance-XOR
-
Operating mode for Ethernet bundles where the link is chosen by calculating the hash out of the source/destination MAC (Layer 2) combined with the IP addresses (Level 3).
- bandwidth
-
Rate of data transfer, usually expressed in multiples of bits per second (bps).
- Barracuda Campus
-
Online documentation and training material for all Barracuda Networks products, located at campus.barracuda.com. Contains feature descriptions, how-to articles, and release notes. Formerly known as Barracuda University and Barracuda TechLibrary.
- Barracuda Central
-
Provides a wide range of statistics, threat information, and a number of useful services to help manage and secure your network. Shares information with Barracuda Networks customers and the Internet security community.
- Barracuda cloud
-
A complementary component of all Barracuda Networks products, providing an added layer of protection and scalability.
- Barracuda Cloud Control
-
A comprehensive cloud-based service that enables administrators to monitor and configure multiple Barracuda Networks products from a single console.
- Barracuda CloudGen Firewall
-
Enterprise-grade, cloud-generation firewall, purpose-built for efficient deployment and operation within dispersed, highly dynamic, and security-critical network environments.The product was formerly known as Barracuda NextGen Firewall or Barracuda NG Firewall and in Q1 2018 got renamed to CloudGen Firewall to emphasize its abilities to protect cloud and dispersed networks.
- Barracuda Networks account
-
Credentialed account used to log into Barracuda Services and Barracuda Appliance Control.
- Barracuda Networks Technical Support
-
Contact Barracuda Networks Technical Support if you need help with your Barracuda Networks product. Visit https://www.barracuda.com/support/index for details.
- Barracuda NextGen Firewall X-Series
-
Application-aware network firewall appliance, designed for organizations without dedicated IT personnel to manage firewalls.
- Barracuda NG Web Security Gateway (IBM ISS)
-
Web Security Gateway engine used by the URL Filter service on the Barracuda NextGen Firewall F-Series. The Barracuda NG Web Security Filter can only be used in combination with the HTTP proxy and is not compatible with Application Control. Requires a Barracuda NG Web Security Gateway subscription.
- Barracuda portal
-
Entry point into Barracuda cloud services.
- Barracuda Reputation
-
A database maintained by Barracuda Central and includes a list of IP addresses of known, good senders as well as known spammers, or IP addresses with a poor reputation.
- Barracuda Reputation Block List
-
Database of IP addresses manually verified to be noted sources of spam.
- Barracuda Vulnerability Manager
-
Barracuda Networks' web application vulnerability management solution to help businesses automatically identify, assess, and mitigate web application security risks including those categorized by the Open Web Application Security Project (OWASP) including SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and others.See also Barracuda Vulnerability Remediation Service (BVRS).
- Barracuda Vulnerability Remediation Service
-
A free add-on to the Barracuda Web Application Firewall, enables automatic scanning, remediation, and maintenance of web application policies.See also Barracuda Vulnerability Manager (BVM).
- Barracuda Web Application Firewall
-
Barracuda's product that blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target applications hosted on web servers and in the cloud.
- Barracuda Web Security Agent
-
A tamper-proof client that can be installed on remote, off-network laptops or desktops to help implement a consistent web security policy across localized and distributed workforces.
- BIND
-
The standard TCP/IP naming service that links network names with IP addresses.
- block device
-
Storage device that moves data in sequences of bytes or bits (blocks). Example: hard disk, CD-ROM drive, flash drive.
- block device mapping
-
Defines the block devices (instance store volumes and EBS volumes) to attach to an AWS instance.
- blocklist
-
List of domains, users, or hosts that are denied access, especially refers to mail and web traffic. Sometimes known as blacklist. Compare to allow list or whitelist.
- Blowfish
-
Licence-free symmetric encryption algorithm that can be used as a replacement for the DES and IDEA algorithms.
- botnet
-
A network of private computers infected with malicious software and controlled as a group without the owners knowledge, for example, to send spam messages. The word botnet is a combination of the words robot and network.
- bridging
-
The action taken by network equipment to create an aggregate network from either two or more communication networks, or two or more network segments. Bridging is distinct from routing, which allows multiple different networks to communicate independently while remaining separate.
- brute-force protection
-
Protection against a brute-force attack, which consists of systematically checking all possible keys or passwords until the correct one is found. This type of attack uses a large number of attempts to gain access to a system.
- bucket
-
In AWS, container for objects that can be stored in Amazon S3.
- BYOD
-
The practice of allowing employees or members of an organization to use their own computers, phones, or other devices for work.
- byte-level data deduplication
-
Data deduplication method that analyzes data streams at the byte level by performing a byte-by-byte comparison of new data streams versus previously stored ones.
- CAST
-
Licence-free symmetric encryption algorithm (key block cipher).
- certificate
-
A document or seal certifying the authenticity of something. A digital certificate certifies the ownership of a public key. This allows relying parties to rely upon signatures or on assertions made about the private key that corresponds to the certified public key.
- changelog
-
Log of configuration changes on the appliance. Can be found in the release notes of the product.
- checksum
-
The result of a mathematical operation that uses the binary representation of a group of data as its basis, usually to check the integrity of the data.
- CIDR
-
Technique supported by BGP4 and based on route aggregation. CIDR allows routers to group routes together in order to cut down on the quantity of routing information carried by the core routers.
- CIFS
-
Standard for sharing files across the Internet.
- Class A|B|C|D network
-
Classes of IP addresses as defined in the Internet Protocol hierarchy.
- classic load balancer
-
In AWS, a Classic Load Balancer makes routing decisions at either the transport layer (TCP/SSL) or the application layer (HTTP/HTTPS), and supports either EC2-Classic or a VPC (virtual private cloud).
- clickjack
-
Malicious technique where a user is tricked into clicking on a button or link on a website using hidden clickable elements inside an invisible iFrame.
- cloaking
-
A search engine optimization (SEO) technique in which the content presented to the search engine spider is different from that presented to the user's browser.
- cloud integration
-
AWS cloud integration allows the firewall to connect directly to the AWS service fabric to rewrite routes in AWS route tables and to retrieve information for the cloud element on the dashboard. Cloud integration also works with Azure.
- cloud operating system
-
A computer operating system that is specially designed to run in a provider's datacenter and be delivered to the user over the Internet or another network. Windows Azure is an example of a cloud operating system or 'cloud layer' that runs on Windows Server 2008.
- cloud portability
-
The ability to move applications and data from one cloud provider to another. This is the opposite of "vendor lock-in".
- cloud-based encryption
-
A service offered by cloud storage providers whereby data is transformed using encryption algorithms and is then placed on a storage cloud.
- CloudFormation
-
AWS management tool that lets you create, manage, and update a collection of AWS resources using templates and allowing Json code for template deployment.
- CloudFormation Stacks
-
Host uploaded content and can be deployed in CloudFormation, an AWS feature.
- CloudFront
-
An AWS content delivery service that helps you improve the performance, reliability, and availability of your websites and applications.
- cloudsourcing
-
Replacing traditional IT operations with lower-cost, outsourced cloud services.
- CloudWatch
-
AWS management tool to monitor resources and applications. Aggregates data and metrics (cpu load, network throughput, disk io, etc), filters it, and provides alarm actions.
- cluster-specific
-
Global settings that apply to a cluster on a Barracuda NextGen Control Center.
- collision domain
-
In Ethernet, the network area within which frames that have collided are propagated. Repeaters and hubs propagate collisions. LAN switches, bridges and routers do not.
- community string
-
Text string that acts as a password and is used to authenticate messages sent between a management station and a router containing an SNMP agent. The community string is sent in every packet between the manager and the agent.
- compression, data
-
The process of encoding digital information by using fewer bits.
- congestion
-
Traffic in excess of network capacity.
- connection draining
-
AWS feature, lets you scale down EC2 instances to reduce sessions.
- connection pool
-
Barracuda Web Application Firewall (WAF) feature. A cache of database connections is maintained so those connections can be reused when future requests to the database are required. Connection pools are used to enhance the performance of executing commands on a database and also cuts down on the amount of time a user must wait to establish a connection to the database.
- content delivery network
-
A distributed system consisting of servers in discrete physical locations, configured in a way that clients can access the server closest to them on the network, thereby improving speeds.
- CPU emulation
-
Masks the virtualization environment, so payload can be detonated more effectively.
- cross region replication
-
Feature of S3 storage class in AWS. Once enabled, every object uploaded to a particular S3 bucket is automatically replicated to a designated destination bucket located in a different AWS region.
- cross-site scripting
-
A type of computer security vulnerability, typically found in web applications, that enables attackers to inject client-side scripts into web pages viewed by users.