154
Appendix B
Peer Internal IP Network The Peer Internal IP Network is the private, or Local Area Network
(LAN) address of the remote gateway or VPN Server you are communi-
cating with.
Peer Internal IP Netmask The Peer Internal IP Netmask is the subnet mask of the Peer Internal IP
Network.
PFS-DH Perfect Forward Secrecy Diffie Hellman Group. PFS forces a DH negoti-
ation during Phase II of IKE-IPSec SA exchange. You can disable this or
select a DH group 1, 2, or 5. PFS is a security principle that ensures
that any single key being compromised will permit access to only data
protected by that single key. In PFS, the key used to protect transmis-
sion of data must not be used to derive any additional keys. If the key
was derived from some other keying material, that material must not
be used to derive any more keys.
PING Packet INternet Groper. Utility program that uses an ICMP echo mes-
sage and its reply to verify that one network node can reach another.
Often used to verify that two hosts can communicate over a network.
PPP Point-to-Point Protocol. Provides a method for transmitting datagrams
over serial router-to-router or host-to-network connections using
synchronous or asynchronous circuits.
Pre-Shared Key The Pre-Shared Key is a parameter used for authenticating each side.
The value can be an ASCII or Hex and a maximum of 64 characters.
Pre-Shared Key Type The Pre-Shared Key Type classifies the Pre-Shared Key. SafeHarbour
supports
ASCII
or
HEX
types
protocol Formal set of rules and conventions that specify how information can
be exchanged over a network.
PSTN Public Switched Telephone Network.
-----R-----
repeater Device that regenerates and propagates electrical signals between two
network segments. Also known as a hub.
RFC Request for Comment. Set of documents that specify the conventions
and standards for TCP/IP networking.
RIP Routing Information Protocol. Protocol responsible for distributing
information about available routes and networks from one router to
another.
RJ-45 Eight-pin connector used for 10BaseT (twisted pair Ethernet) net-
works.
route Path through a network from one node to another. A large internet-
work can have several alternate routes from a source to a destination.
routing table Table stored in a router or other networking device that records avail-
able routes and distances for remote network destinations.
RTS Request to Send. Circuit activated in hardware flow control when a
computer (or other DTE) is ready to transmit data to a modem (or
other DCE). See CTS, xon/xoff.
-----S-----
SA Encrypt Type SA Encryption Type refers to the symmetric encryption type. This
encryption algorithm will be used to encrypt each data packet. SA
Encryption Type values supported include
DES
,
3DES
,
CAST
and
Blow-
fish
.
SA Hash Type SA Hash Type refers to the Authentication Hash algorithm used during
SA negotiation. Values supported include
MD5 SHA1
. N/A will display
if NONE is chose for Auth Protocol.