[permalink] [id link]
# The VPN server encrypts this reply packet, encapsulates it in a VPN packet and sends it out over the Internet.
from
Wikipedia
Some Related Sentences
# and VPN
# When the VPN client wishes to communicate with the company server, it prepares a packet addressed to 192. 168. 1. 10, encrypts it and encapsulates it in an outer VPN packet, say an IPSec packet.
# When the packet reaches the VPN server from the Internet, the VPN server decapsulates the inner packet, decrypts it, finds the destination address to be 192. 168. 1. 10, and forwards it to the intended server at 192. 168. 1. 10.
# After some time, the VPN server receives a reply packet from 192. 168. 1. 10, intended for 192. 168. 1. 50.
By the fourth quarter of 2002, sales of SofaWare's Safe @ Office firewall / VPN appliances skyrocketed, and SofaWare held the # 1 revenue position in the worldwide firewall / VPN sub -$ 490 appliance market, with a 38 % revenue market share.
# Routing and remote access features: Microsoft Forefront TMG can act as a router, an Internet gateway, a virtual private network ( VPN ) server, a network address translation ( NAT ) server and a proxy server.
# and server
# A query to the obtained TLD server for the address of a DNS server authoritative for the second-level domain.
# For SSL with mutual authentication, the SSL / TLS session is managed by the first server that initiates the connection.
# With mutual SSL / TLS, security is maximal, but on the client-side, there is no way to properly end the SSL connection and disconnect the user except by waiting for the SSL server session to expire or closing all related client applications.
# For performance reasons, static content that is not specific to the user or transaction, and thus not private, is usually delivered through a non-crypted front server or separate server instance with no SSL.
# The application layer ( for example HTTP ) contains all protocols for specific data communications services on a process-to-process level ( for example how a web browser communicates with a web server ).
# A middle dynamic content processing and generation level application server, for example Ruby on Rails, Java EE, ASP. NET, PHP, ColdFusion, Perl platform.
# The client's local operating system sends the message from the client machine to the server machine.
# At each change of service, the previous receiver shall become the server and the partner of the previous server shall become the receiver.
# A device that connects a number of links with only one destination, the main function of this device is to make a kind of load balancing between two or more servers connected together, data distribution is done according to the server processing rate.
# IOR interceptors mediate the creation of the new references to the remote objects, presented by the current server.
# Server interceptors mediate the handling of the remote method calls on the server ( handler ) side.
# The server implements NFS daemon processes ( running by default as ) in order to make its data generically available to clients.
# The server administrator determines what to make available, exporting the names and parameters of directories ( typically using the configuration file and the command ).
# and encrypts
# Using all data generated in the handshake thus far, the client ( with the cooperation of the server, depending on the cipher being used ) creates the pre-master secret for the session, encrypts it with the server's public key ( obtained from the server's certificate, sent in step 2 ), and then sends the encrypted pre-master secret to the server.
# The client encrypts the challenge-text using the configured WEP key, and sends it back in another authentication request.
# The challenge oracle selects one of the messages by flipping a fair coin, encrypts the message under the public key, and returns the resulting ciphertext to the adversary.
# Bob concatenates the exponentials ( g < sup > y </ sup >, g < sup > x </ sup >) ( order is important ), signs them using his asymmetric key B, and then encrypts them with K. He sends the ciphertext along with his own exponential g < sup > y </ sup > to Alice.
# Alice concatenates the exponentials ( g < sup > x </ sup >, g < sup > y </ sup >) ( order is important ), signs them using her asymmetric key A, and then encrypts them with K. She sends the ciphertext to Bob.
# and reply
# Negotiation ( Technically EAP negotiation ) The authentication server sends a reply ( encapsulated in a RADIUS Access-Challenge packet ) to the authenticator, containing an EAP Request specifying the EAP Method ( The type of EAP based authentication it wishes the supplicant to perform ).
# Closed or Denied or Not Listening: The host sent a reply indicating that connections will be denied to the port.
# It is wrong to accuse Dor Daim and talmide ha-Rambam of being extremists, or of dismissing more moderate coreligionists as unbelievers: see reply to 2 above.
# The coordinator sends a query to commit message to all cohorts and waits until it has received a reply from all cohorts.
# Output / Response message-This is reply sent by the NE ( Network Element ) in response to an input message.
# Samannaphala Sutta ( sāmañña -): King Ajatasattu of Magadha asks the Buddha about the benefits in this life of being a samana ( most often translated as " recluse "); the Buddha's main reply is in terms of becoming an arahant by the path outlined above
# Mahali Sutta ( mahāli -): in reply to a question as to why a certain monk sees divine sights but does not hear divine sounds, the Buddha explains that it is because of the way he has directed his meditation ; he then reports the following sutta
1.073 seconds.