The ISA Server extension of the Windows network address
translation (NAT) feature. SecureNAT provides a degree of address
transparency for networked clients. NAT substitutes a global IP
address, valid on the Internet, for an internal IP address. ISA
Server enhances the underlying Windows NAT functionality by
enabling access control for FTP, Windows NetMeeting for H.323, and
T-120 protocols. It also enables rerouting HTTP requests, which can
then frequently be satisfied by a local cache. This enhancement
greatly improves HTTP performance and lowers bandwidth
Sockets Layer (SSL)
A protocol that supplies secure data communication through data
encryption and decryption. SSL enables communications privacy over
The process by which a server behind an ISA Server computer can
publish to the World Wide Web (WWW) without compromising security.
See also reverse
hosting and publishing.
See secure network address translation (SecureNAT).
An identifier that is part of the access control entry
A digital certificate (SSL certificate) installed on a server
and used by the server to authenticate itself to a client.
filters, a COM object that implements an IFWXSessionFilter interface. A
session filter object is created by an application filter for a
specific session (client computer) when the Microsoft Firewall
service raises a network event for which the application filter is
See security identifier (SID).
Transfer Protocol (SMTP)
An Internet standard protocol used for exchanging e-mail
messages between SMTP servers on the Internet.
See Simple Mail Transfer Protocol (SMTP).
Software that makes up the smallest unit of console extension.
One snap-in represents one unit of management behavior (for
example, the event log viewer is a functional unit of management
and thus a good candidate to become a snap-in). Technically,
snap-ins are OLE InProc servers.
A logical communications channel used by TCP/IP applications.
Sockets are data structures created by using a combination of
device IP addresses and reserved TCP/UDP port numbers to indicate
connection and delivery service information. See also Windows Sockets
A protocol for traversing firewalls in a secure and controlled
manner, made available to the public by the Internet Engineering
Task Force (IETF).
The practice of making a transmission appear to come from an
authorized user. For example, in DNS spoofing, the DNS name of
another system is assumed either by corrupting a name-service cache
or by compromising a domain-name server for a valid domain.
See Structured Query Language (SQL).
A server that uses the Structured Query Language (SQL) to
query, update, and manage a relational database.
A database query and programming language widely used for
accessing data in, querying, updating, and managing relational
database systems. See also SQL server.
A TCP/IP configuration parameter that extracts network and host
configuration data from an IP address. This 32-bit value enables
the recipient of IP packets to distinguish the network ID portion
(domain name) of the IP address from the host ID (host name).