Export (0) Print
Expand All

P

Internet Security and Acceleration Server 2004/2006 SDK

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

passive caching
In this type of service, data is cached and discarded entirely on the basis of object size, popularity, or time since the requested object was last updated in the cache. Frequently referred to as on-demand caching because all caching updates are user-initiated. See also active caching.
password authentication
See authentication.
ping
A TCP/IP utility that verifies connections to one or more remote computers by sending ICMP packets and listening for reply packets.
plug-in
A third-party application that is installed to extend and enhance the functionality of ISA Server.
Point-to-Point Protocol (PPP)
A communications protocol that allows a computer to connect to other computers over a standard dial-up telephone line using a high-speed modem.
Point-to-Point Tunneling Protocol (PPTP)
A networking protocol that enables remote users to access corporate networks securely across the Internet by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP supports multiprotocol virtual private networks (VPNs). Because PPTP allows multiprotocol encapsulation, users can send any packet type over an IP network.
POP
See Post Office Protocol (POP).
popularity
A measure of the frequency with which objects or URLs are requested by client applications, such as Web browsers. See also cache.
port number
A number that identifies a certain Internet application with a specific connection. Ports are used in TCP to name the ends of logical connections that carry long-term conversations.
Post Office Protocol (POP)
A network protocol that permits a client computer to access e-mail on a server. Usually, this means that a POP3 server is used to allow a client computer to retrieve mail that an SMTP server is holding for it.
PPP
See Point-to-Point Protocol (PPP).
PPTP
See Point-to-Point Tunneling Protocol (PPTP).
protocol
A set of rules and conventions for sending information over a network. These rules govern the content, format, timing, sequencing, and error control of messages exchanged among network devices. The family of networking protocols for communication across interconnected networks and the Internet is Transmission Control Protocol/Internet Protocol (TCP/IP). ISA Server policy rules use protocol definitions to identify individual protocols. A protocol definition may include a set of primary connections, a set of secondary connections, and a set of application filters that are associated with the protocol. Each connection, in turn, is defined by the name of an IP protocol, a port number, and a direction, which may be outbound or inbound.
proxy
A software component that connects a user to a remote destination through an intermediary gateway.
proxy client
A client computer that must use a proxy server to gain access to network services not directly supported for client usage.
proxy server
A computer that acts as a relay between remote servers and clients to intercept requests and process communications on behalf of proxy clients.
publishing
The process that allows computers remote from an ISA Server computer to publish to the Internet. Publishing includes reverse hosting and secure Web publishing.
Show:
© 2014 Microsoft