General networkingΒΆ

ACK (Acknowledgment Code)
A unique signal sent by a computer to show that it has successfully transmitted data
API (Application Programming Interface)
A software component that allows applications to share data and functionality
CIDR (Classless Inter-Domain Routing)
An IP addressing method that improves the efficiency of allocating IP addresses
CLI (Command-line Interface)
A text-based interface for applications and operating systems that allows a user to enter commands and receive
DNS (Domain Name System)
A system by which computers and other devices on the Internet or Internet protocol networks are uniquely identified using names matched to their IP addresses
ICMP (Internet Control Message Protocol)
A protocol used for devices within the network to determine possible network issues
IPFIX (Internet Protocol Flow Information Export)
A protocol intended to collect and analyze the of flow data from supported network devices
LDAP (Lightweight Directory Access Protocol)
An open, cross-platform protocol used to access and maintain directory services for assets in an Internet protocol network
MTTR (Mean Time to Resolution)
The the average amount of time between the detection and remediation of a security threat or incident
NDR (Network Detection and Response)
A cybersecurity solution that use machine learning to detect cyber threats and aid remediation
NTP (Network Time Protocol)
A networking protocol used to synchronize device clocks over the Internet
NXDOMAIN (No Existing Domain)
An error message that means that a domain mentioned in the Domain Name System (DNS) query does not exist
RADIUS (Remote Authentication Dial-In User Service)
A client-server AAA (authentication, authorization, accounting) protocol used to manage remote user access to a network
SNMP (Simple Network Management Protocol)
An IP network protocol used to collect data related to state and/or behavior from devices on a network
SSDP (Simple Service Discovery Protocol)
A network protocol used for advertising and discovering network services
SSH (Secure Shell Protocol)
A network communication protocol that allows network services to be used securely over an unsecured network
SYN scan
A port scanning technique that allows for the discovery of the status of a communications port without establishing a full connection
Syslog
A cross-platform network logging protocol used to send and/or receive alerts between different devices on a network
TACACS+ (Terminal Access Controller Access-Control System)
A protocol where the remote access server and the authentication server provide validation for users attempting to access the network
TLS handshake
The process that starts secure communication between a client and a server
TCP (Transmission Control Protocol)
A connection-oriented protocol that enables the bidirectional exchange of messages between devices on the same network
UDP (User Datagram Protocol)
A communication protocol for transmitting messages between applications and programs in a network
Virtual appliance
A pre-configured virtual machine image with pre-installed software that is meant to serve a specific function
VPC (Virtual Private Cloud)
A secure and private cloud hosted in a public cloud
VRF (Virtual Routing and Forwarding)
A technology that separates routing tables to isolate management traffic to the management interface