Glossary
-
Authentication, Authorization, and Accounting
-
Active Directory
-
Administrative Domain
-
Advanced Encryption Standard
-
Amazon Machine Image
-
Access Point
-
Application Programming Interface
-
Access Point Name
-
Advanced Persistent Threat
-
Advanced Threat Protection
-
Antivirus
-
Attribute Value Pairs
-
Amazon Web Service
-
Border Gateway Protocol
-
Command and Control
-
Certificate Authority
-
Cloud Access Security Inspection
-
Cipher Block Chaining
-
Challenge-Handshake Authentication Protocol
-
Classless Inter-Domain Routing
-
Command Line Interface
-
Common Name
-
Change of Authorization
-
Central Processing Unit
-
Certificate Revocation List
-
Certificate Signing Request
-
Comma Separated Value
-
Common Vulnerabilities and Exposures
-
Domain Controller, Direct Current
-
Data Encryption Standard
-
Diffie-Hellman
-
Dynamic Host Configuration Protocol
-
Dynamic-Link Library
-
Data Loss Prevention
-
Distinguished Name
-
Destination Network Address Translation
-
Domain Name System
-
Differentiated Services Code Point
-
Disable Server Response Inspection
-
Datagram Transport Layer Security
-
E-mail Address
-
Extensible Authentication Protocol over LAN (Local Area Network)
-
Endpoint Control
-
Elastic Compute Cloud
-
Exterior Gateway Protocol
-
Enterprise Management Server
-
Electrostatic Discharge
-
Encapsulated Security Payload
-
FortiAnalyzer
-
FortiClient
-
FortiGuard Distribution Network
-
FortiGuard Distribution Servers
-
FortiGate
-
FortiGate-FortiManager
-
FortiManager
-
Fully Qualified Domain Name
-
FortiSandbox
-
Fortinet Single Sign-On
-
File Transfer Protocol
-
Gatekeeper Confirm
-
General Packet Radio Service
-
Generic Routing Encapsulation
-
GPRS Tunneling Protocol
-
Graphical User Interface
-
Globally Unique Identifier
-
High Availability
-
Hard Cache
-
Hard Disk Drive
-
HyperText Markup Language
-
HyperText Transfer Protocol
-
Input / Output
-
Identity-based Policy
-
Internet Content Adaptation Protocol
-
Internet Control Message Protocol
-
Interior Gateway Protocol
-
Internet Key Exchange
-
Internet Message Access Protocol
-
Indicators of Compromise
-
Internet Protocol
-
Intrusion Prevention System
-
Internet Protocol Security
-
Internet Service Database
-
Internet Service Provider
-
Initialization Vector
-
JavaScript Object Notation
-
Layer 2 Tunneling Protocol
-
Link Aggregation Control Protocol
-
Local Area Network
-
Lightweight Directory Access Protocol
-
Media Access Control
-
Message Digest 5
-
Media Gateway Controller Protocol
-
Management Information Base
-
Microsoft Management Console
-
Microsoft Challenge-Handshake Authentication Protocol
-
Maximum Segment Size
-
Network Access Control or Compliance
-
Network Access Server
-
Network Address Translation
-
Network Address Translation (NAT) Port Translation
-
Network Device Collaborative Protection Profile
-
Next-Generation Firewall
-
Network News Transfer Protocol
-
Network Operations Center
-
Network Processing Unit
-
NT LAN Manager
-
Network Time Protocol
-
Online Certificate Status Protocol
-
Odette File Transfer Protocol
-
Open Network Computing Remote Procedure Call
-
Open Shortest Path First
-
One-time Password
-
Organization Unit
-
Organizationally Unique Identifier
-
Open Virtualization Format
-
Password Authentication Protocol
-
Port Address Translation
-
Power Entry Module
-
Perfect Forward Secrecy
-
Public Key Cryptography Standards
-
Public Key Infrastructure
-
Power over Ethernet
-
Post Office Protocol 3
-
Point-to-Point Protocol
-
Point-to-Point Protocol over Ethernet
-
Point-to-Point Tunneling Protocol
-
Pre-Shared Key
-
Remote Authentication Dial-In User
-
Redundant Array of Independent Disks
-
Random Access Memory
-
Registration, Admission, and Status
-
Role Based Access Control
-
Registration Confirm
-
Remote Desktop Protocol
-
Representational State Transfer
-
Remote Function Call
-
Remote Shell
-
RADIUS Single Sign-On
-
Real-Time Monitor
-
Real-Time Protection
-
Real-Time Streaming Protocol
-
Storage Area Network
-
Shelf Alarm Panel
-
Simple Certificate Enrollment Protocol
-
Secure Copy
-
Server-based Certificate Validation Protocol
-
Software Development Kit
-
Software-Defined Networking
-
Secure (or SSH) File Transfer Protocol
-
Secure Hash Algorithm 1
-
Session Initiation Protocol
-
Simple Mail Transfer Protocol
-
Secure Network Address Translation
-
Server Name Indication
-
Simple Network Management Protocol
-
Security Operations Center
-
Structured Query Language
-
Secure Shell
-
Service Set Identifier
-
Secure Sockets Layer
-
Single Sign-On
-
Terminal Access Controller Access-Control System
-
Tool Command Language
-
Transmission Control Protocol
-
Trivial File Transfer Protocol
-
Transport Layer Security
-
Transparent Network Substrate
-
Time-to-live
-
User Datagram Protocol
-
Unique Identifier
-
Uniform Resource Identifier
-
Uniform Resource Locator
-
Unified Threat Management
-
Universally Unique Identifier
-
Virtual Domain
-
Virtual Hard Disk
-
Virtual Internet Protocol
-
Virtual Local Area Network
-
Virtual Machine
-
Virtual Machine Disk
-
Voice over Internet Protocol
-
Virtual Private Cloud
-
Virtual Private Network
-
Vendor Specific Attribute
-
Web Application Firewall
-
Wide Area Network
-
Web Cache Communication Protocol
-
Wireless Intrusion Detection System
-
Wi-Fi Protected Access
-
Wi-Fi Protected Access II
-
Web Services Description Language
-
Wireless Transaction Protocol
-
Extended Authentication
-
eXtensible Markup Language
-
Cross-site Scripting
-
XenServer Virtual Appliance