
Welcome to the Network Glossary, your reference guide for key terms, definitions, and concepts used in networking and IT systems.
If you’re expanding your knowledge, explore our Video Surveillance Glossary and Access Control Glossary for more related terminology. These resources are designed to help security professionals, integrators, and end users better understand the technologies shaping today’s security solutions.
Network Glossary
A complete A–Z reference of key networking and IT terms for security professionals and integrators.
Network Glossary Terms and Definitions
A
ACL
Packet filtering rules on routers/switches.Air-Gap
Physical network separation for high security.Anycast
Same IP advertised from many sites for resilience.ARP
Resolves IP to MAC addresses on a LAN.
C
Capacity Planning
Forecasting compute, storage, and network.Certificate/PKI
Public key infrastructure for identity and trust.Change Control
Process managing production changes and rollback.Client VPN
User-initiated remote access tunnel.Containers (Docker/K8s)
Package and orchestrate apps for portability.Core/Access Switch
Two-tier architecture for campus networks.CVE/CVSS
Vulnerability IDs and severity scoring system.
D
Data at Rest Encryption
Encrypt disks/volumes where video is stored.Data Classification
Categorize data for protection and retention.Data in Transit Encryption
Encrypt traffic between cameras, servers and clients.DLP
Prevent sensitive data exfiltration.DNS
Resolves domain names to IP addresses.
E
EDR/XDR
Endpoint/extended detection and response tools.Ethernet
Wired LAN technology used by IP cameras and servers.Extender (PoE)
Device extending Ethernet/PoE beyond 100m.
F
Firewall
Controls traffic via rules; stateful inspection.
G
Georedundancy
Replicate data/services across regions.GPU Passthrough
Assign GPUs to VMs/containers for analytics.Guest/VLAN Edge
Isolated networks for visitors and IoT devices.
H
Hardening Guides
Vendor/industry baselines to reduce attack surface.Health Probes
Automated checks for service uptime.High Availability Cluster
Redundant servers that fail over on faults.
I
IDS/IPS
Intrusion detection/prevention systems.IGMP Snooping
Manages multicast streams to prevent flooding.Immutable Backups
Write-once backups protecting from ransomware.IPv4/IPv6
Internet Protocol versions; addressing and routing.iSCSI/NFS/SMB
Common storage protocols for video servers.
K
Key Management Service
Centralized encryption key lifecycle control.
L
LAG/LACP
Aggregates multiple links for bandwidth/redundancy.Latency/Jitter
Delay and its variation over time.LC/SC Connectors
Common fiber connector types.Least Privilege
Grant only the minimum necessary permissions.Length Limit (100m)
Ethernet copper max distance without extenders.Load Balancer
Distributes traffic across servers/services.
M
Media Converter
Converts copper to fiber or coax to Ethernet.Micro-Segmentation
Fine-grained policy per workload/device.MTU/Jumbo Frames
Packet size; larger frames reduce overhead on LANs.Multicast/Unicast
One-to-many vs one-to-one streaming modes.Multimode/Singlemode Fiber
Short vs long-distance optical fiber types.
N
NAT/PAT
Translates private to public addresses; ports.NetFlow/sFlow
Flow telemetry for traffic analysis.
O
Observability
Metrics, logs, traces for understanding systems.
P
Packet Loss
Dropped packets causing artifacts and stutter.Patching
Regular updates to fix vulnerabilities.Penetration Testing
Authorized simulated attacks to find weaknesses.PoE (802.3af)
Delivers up to ~15.4W per port; common for cameras.PoE bt/UPoE (802.3bt)
Up to 60-90W; multi-sensor/thermal/PTZ.PoE+ (802.3at)
Up to ~30W; powers PTZs/heaters.
Q
QoS (DSCP)
Traffic prioritization for latency‑sensitive streams.
R
RADIUS/TACACS+
Centralized authentication for admins/network access.RAID 5/6/10
Redundant disk arrays used in NVR/VMS servers.Ransomware Protection
Backup isolation, least privilege, EDR.Red/Blue/Purple Team
Attack/defense/collaborative testing functions.Routing Protocols (OSPF/BGP)
Dynamic routing for medium/large networks.RTSP over TCP/UDP
Transport choice for reliability vs latency.Runbook/Playbook
Step-by-step response or maintenance procedures.
S
SD-WAN
Policy-based WAN overlay using multiple links.Secrets Management
Secure storage/rotation of keys/passwords.Service Accounts
Non-human accounts with scoped permissions.SFP/SFP+
Fiber/copper transceivers for 1/10 Gbps links.SIEM
Security information/event management platform.Site-to-Site VPN
Permanent tunnel between locations.SLA/SLO/SLI
Service metrics and objectives for uptime/performance.SNMPv3
Encrypted/authorized monitoring of devices.SSH
Encrypted remote shell for device administration.Static/DHCP
Manual vs automatic IP addressing.Storage (NAS/SAN)
Network-attached vs storage-area networks.STP/RSTP/MSTP
Loop prevention protocols in Ethernet switching.Subnet/Gateway
Defines local network and route to other networks.Switch (Managed)
Provides VLANs, QoS, PoE budgets, port security.SysHealth API
Programmatic health/metrics export from platforms.Syslog
Centralized logging protocol for network devices/servers.
T
Throughput/Goodput
Raw vs useful data transfer rates.TLS/SSL
Encryption for HTTPS and secure services.Trunk/Access Port
Trunk carries multiple VLANs; access carries one.
U
UTP/STP Cabling
Unshielded vs Shielded twisted pair; Cat5e/6/6A/7.
V
Virtualization (VMware/Hyper-V)
Run multiple VMs per host for consolidation.VLAN
Logical LAN segmentation for isolation and broadcast control.VPN (IPsec/SSL)
Encrypted tunnels for remote access/site-to-site.Vulnerability Scanning
Continuous checks for CVEs and misconfigurations.
W
Write Endurance
SSD metric for total bytes written (TBW/DWPD).
Z
Zero Trust
Model assuming no implicit trust; verify each request.
#
802.1X
Port-based network access control using EAP.
This Network Glossary is part of our ongoing effort to provide educational resources for the security industry. For deeper insights, check out our related blog posts such as Networking Basics for Security Systems or Cybersecurity Best Practices. If you have questions or want to explore product options, contact our team for expert support.