Vonage VDV21-VD User Guide - Page 112

Traceroute is a utility used to determine the route a packet has taken from your, as the Internet

Page 112 highlights

Vonage V-Portal User Guide email on a TCP/IP network. Spoofing In general, spoofing is a term used in networking to describe the ways in which software and hardware can be fooled. An example of this would be spoofing a MAC address. Spoofing a MAC address will alter the header of a packet to make it appear as if a message was sent from an authorized computer. Subnet Mask A subnet mask is used determine whether traffic generated by network devices will be directed internally within the LAN or externally over the Internet connection based upon the ultimate destination address (i.e. IP address) of that traffic. Syslog Syslog is a standard for logging messages in an IP network. The term is often used to refer to the protocol for logging the messages as well as the file containing the messages. Syslog is typically used for computer system management and security auditing. TCP Transmision Control Protocol. A protocol for transmitting data over a network, such as the Internet, that requires the recipient of the data to acknowledge it has been received. Traceroute Traceroute is a utility used to determine the route a packet has taken from your computer, across the Internet, to its specified destination. UDP User Datagram Protocol. UDP enables programs on networked computers to send short messages to one another. UPnP Universal Plug and Play. UPnP is a standard that enables devices to be plugged into a network and automatically know about each other. VPN Virtual Private Network. A VPN is a private network used to communicate over the public Internet. It is often used by companies to connect remote sites or users together. WAN Wide Area Network. A WAN is a network that covers a relatively broad geographic area. View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. Pay particular attention to 112 Section 11 which explains limitations on Warranty, Remedy and Liability.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

Vonage V-Portal User Guide
View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. Pay particular attention to
Section 11 which explains limitations on Warranty, Remedy and Liability.
112
email on a TCP/IP network.
Spoofing
In general, spoofing is a term used in networking to describe the ways in which
software and hardware can be fooled. An example of this would be spoofing a
MAC address. Spoofing a MAC address will alter the header of a packet to make it
appear as if a message was sent from an authorized computer.
Subnet
Mask
A subnet mask is used determine whether traffic generated by network devices will
be directed internally within the LAN or externally over the Internet connection
based upon the ultimate destination address (i.e. IP address) of that traffic.
Syslog
Syslog is a standard for logging messages in an IP network. The term is often
used to refer to the protocol for logging the messages as well as the file containing
the messages. Syslog is typically used for computer system management and
security auditing.
TCP
T
ransmision
C
ontrol
P
rotocol. A protocol for transmitting data over a network, such
as the Internet, that requires the recipient of the data to acknowledge it has been
received.
Traceroute
Traceroute is a utility used to determine the route a packet has taken from your
computer, across the Internet, to its specified destination.
UDP
U
ser
D
atagram
P
rotocol. UDP enables programs on networked computers to send
short messages to one another.
UPnP
U
niversal
P
lug a
n
d
P
lay. UPnP is a standard that enables devices to be plugged
into a network and automatically know about each other.
VPN
V
irtual
P
rivate
N
etwork. A VPN is a private network used to communicate over the
public Internet. It is often used by companies to connect remote sites or users
together.
WAN
W
ide
A
rea
N
etwork. A WAN is a network that covers a relatively broad geographic
area.