Glossary of Terms
An additional layer of security. This feature is powered by Google and, when enabled, after supplying your username and password you will be required to supply a security code to gain access.
Used to refer the status of users. Activated users can log into the UI and use the functions there. The opposite is Deactivated.
The limit of your physical resources (VCPUs, Storage, RAM, etc.).
An option in the user interface that indicates that the VM should be backed up in case of failure.
A specific day of the month or a period in days representing the billing time period and frequency.
This type of storage can be added quickly and removed on demand. For an additional charge, it can be acquired on a monthly basis making it the best solution when you need more backup storage as quickly as possible. You will find this storage type in connection to Cloud Backup for Veeam.
To make an exact copy of a VM that belongs to the same organization. Cloning will copy not only the VM’s settings (VCPU, memory, etc.), but also all of the installed software and data on the source VM.
A group of VM’s under one vCenter Installation.
Use the Console link to access your device in order to perform administrative tasks, install software, or perform other tasks. The Console is a particularly useful tool if your server appears unresponsive.
Used to refer the status of users. Deactivated users can’t log into the UI and can’t use the functions there. The opposite is Activated.
DHCP is a network protocol used to dynamically assign IP addresses to devices on a network. Beside getting an IP address, devices automatically receive other network configuration information such as subnet mask and default gateway. DHCP simplifies network administration because it does not require an administrator to manually assign and unassign IP addresses.
DNS servers maintain a directory of domain names and translate them to IP addresses.
It is the notation at the end of a web address that specifies an internet category or a country code.
The process of verifying the ownership of newly added domains. As the domain admin, you should receive a verification email, and confirm the verification process. Alternatively, you may verify domain ownership via DNS string.
A networking device that sits between a server and the rest of the Internet that decides what network traffic to allow through and what network traffic to block based on the rules configured within it.
Typically, a firewall is used to only allow access to IP addresses and ports that must be used for a server to accomplish its task; traffic going to any port not specifically allowed by a firewall is blocked.
A user-configurable set of policies that dictate what traffic the firewall will allow to pass through, and what traffic the firewall will block.
A forward DNS lookup will, when supplied with a domain name (for example google.com), return the IP address for the supplied domain.
FQDN is the complete domain name for a specific computer or host on the Internet. It consists of two parts: the hostname and the domain name. For example mymail.example.com. The hostname is mymail which is located within the domain example.com.
Health Checks ensure that the Load Balancer distributes new requests only to servers that are operating and ready to receive them. A health check can return values Healthy or Unhealthy.
In terms of virtual machines, the host is the physical machine on which the virtual machine is living. One host can support many virtual machines.
DHCP server leases an IP address to a device for a specific period of time, the lease time. This can vary depending on how long a device requires the Internet connection at a particular location. Devices release addresses when their leases expire and request a renewal from the DHCP server if they are staying online. Otherwise, the DHCP server might assign the IP address to a different device.
A networking device that can distribute workload among multiple VM’s or physical servers.
A collection of IP addresses that have been identified as possible targets in a load balanced system. Each entry in the pool is an IP address that the load balancer can choose to use to support traffic going to the load balancer IP for that particular pool. The IP address does not have to be on the cloud; it can be an IP for a cloud VM, an EC2 VM or even a physical server somewhere.
RAM stands for Random Access Memory and is the memory or information storage in a computer that is used to store running programs and data for the programs.
A name server is a web server that has DNS software installed on it. It is a server that is managed by a web host specifically designated for managing the domain names that are associated with all of the hosting provider's accounts.
Network Address Translation (NAT) is a method where a network device assigns a public address to a computer or group of computers inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company can use due to security and economy purposes.
A node is a processing location.
Permanent storage is what you contractually request (1 TB/month minimum). It is always at your disposal and since it is associated to a contractual obligation it cannot be modified as swiftly as Burst storage. You will find this storage type in connection to Cloud Backup for Veeam.
Refers to a VM that has been powered down, but is still provisioned and, in most cases, able to be powered back on. Powered Off VMs are billed at a different rate than Powered On VMs. The opposite is Powered On.
Refers to a VM that is booted up and running and able to be accessed. In most cases, a Powered On VM can be powered off. Powered On VMs are billed at a different rate than Powered Off VMs. The opposite is Powered Off.
Refers to the virtualized compute and/or storage resources run on infrastructure dedicated to one user or company.
Refers to connectivity into a private extranet network which by its design emulates the functioning of the Internet. We assign 1 private IP to every VM automatically, and they are intended to allow customers to access their VMs even if they do not want to make them accessible to the public Internet.
PTR records resolve an IP address to a fully qualified domain name (FQDN). They are also called Reverse DNS records. PTR records are mainly used to check if the server name is actually associated with the IP address from where the connection was initiated.
Refers to the virtualized compute and/or storage resources run on infrastructure shared between multiple users or companies.
Public IP addresses are addresses assigned to computers and devices so that they can find each other on the Internet.
One of two permission levels for users in the UI. Read Only users can perform only read actions.
Immediately power off and power on a VM. Reboots can be triggered for VMs from the UI.
Virtual firewalls can be placed in a Remote Access Only state, when all traffic is blocked, except access port 22 (SSH) and port 3389 (RDP). Access from the Console is, of course, still enabled.
Also known as a "Leased IP Address", a Reserved IP Address is an IP that was formerly assigned to a Virtual Machine belonging to a customer, but was designated to be kept for use on future VMs during the deprovisioning of the VM.
A reverse DNS lookup is used to lookup the domain name for a supplied IP address. This can be a useful feature to anyone, but it is particularly practical for those running an outgoing mail server, as it can check a sender’s address.
Also known as disk space, this is the amount of storage space allotted for data storage on a virtual machine.
A function that places a user, or a group of users into a temporary “read only” mode in order to resolve potential billing, fraud, or other issues. While Suspended, the users can’t modify or create any products or configurations, though anything previously set up continues as is.
Tags are used to as a way to sort your devices into manageable categories and containers. They have no effect on how your devices run or how they are billed, they simply make it easier for you to filter out and manage your devices.
TTL stands for Time to Live, and it is a numerical value of how long a DNS record will be cached before it needs to be refreshed. The default value is 3600 seconds.
A virtual CPU for a computer server.
A virtual firewall behaves like a standard firewall, but is virtualized and does network address translation.
A virtual computer server. A VM always has 4 main configurable elements for it—VCPU, memory, storage, and operating system—and allows other optional services to be used with it (firewall rules, load balancer pools, public IP addresses, and a backup option).
Virtual Network Storage is a logical partition primarily used in cloud computing and virtualization environments. It provides a virtual drive that you can access from your virtual machines or from private computers, either using NFS or iSCSI. Virtual Network Storage allows traffic to be isolated within a physical storage area network and thus minimizes the total system vulnerability improving overall security.
A stored, recallable set of configurations for a VM (VCPU, memory, etc.) that a given user can pick when creating a new VM in order to quickly fill out the form to get it set up.
A specific type of cloud product where a client has created A VM that has been created by a client and modified (installed certain software, set up certain configurations, etc.) in order to create a VM that is tailored to a specific purpose. The client can then use this customized VM as a base to create a template which they can use to quickly deploy new VMs with the identical custom configuration.
VMWare Tools is an optional set of utilities which enhances the performance of a virtual machine’s guest operating system and improves management of a virtual machine.
Virtual Private Data Center (VPDC) is custom virtualized hosting environment offered at phoenixNAP that blends shared and dedicated resources and is based on VMware.
The phoenixNAP Unified Network enables you to achieve connectivity between your dedicated servers or Colocation environment and your phoenixNAP virtual resources.
Once the Unified Network has been set up you will be able to communicate privately between to public cloud virtual machines as well as to use network storage with your colocation and/or dedicated servers.