
Glossary
firewall
A set of security programs, which is located at a network gateway server and which protect the network from
any user on an external network. See gateway.
FQDN
See Fully Qualified Domain Name (FQDN).
FTP
File Transfer Protocol; rules for transferring files from one computer to another.
FTP cluster
A virtual cluster providing service on the FTP control port (port 21). See cluster and virtual cluster.
Fully Qualified Domain Name (FQDN)
The complete, registered domain name of an Internet host, which is written relative to the root domain and
unambiguously specifies a host’s location in the DNS hierarchy. For example, east is a hostname and
east.coyotepoint.com is its fully qualified domain name. See also domain name.
G
gateway
A network route that typically translates information between two different protocols.
geographic cluster
A collection of servers (such as Web sites) that provide a common service over different physical locations. See
cluster.
geographic load balancing
Distributing requests as equally as possible across servers in different physical locations. See load balancing.
See also intelligent load balancing.
geographic probe
A query sent to a site in a geographic cluster to gather information so Equalizer can determine the site that is
best able to process a pending request. See geographic cluster.
H
header
One or more lines of data that identify the beginning of a block of information or a file.
hot backup
Configuring a second Equalizer as a backup unit that will take over in case of failure. Also known as a hot spare.
See backup Equalizer. See also primary Equalizer. A server can also be used as a hot backup, or hot spare,
within a cluster. If all the other servers in the cluster fail, the hot spare will begin processing requests for the
cluster.
HTTP
HyperText Transfer Protocol; the protocol with which a computer or user access information on the World Wide
Web.
HTTPS
HyperText Transfer Protocol (Secure). The SSL/TLS protocol is used in combination with the HTTP protocol to
provide secure identification and data encryption.
582
Copyright © 2013 Coyote Point Systems. A subsidiary of Fortinet, Inc.
Kommentare zu diesen Handbüchern