| Glossary
375
Glossary
Glossary
A
CCESS
C
ONTROL
—
Refers to mechanisms and policies that restrict access to computer
resources. An access control list (ACL), for example, specifies what operations different users
can perform on specific files and directories.
A
LARM
—
A signal alerting the user to an error or fault. Alarms are produced by events. Alarms
produce a message within the Alarm Window.
API —
Application Programing Interface—A set of routines used by the application to direct
the performance of procedures by the computer’s operating system.
A
UTHENTICATION
—
The process of determining the identity of a user that is attempting to
access a network. Authentication occurs through challenge/response, time-based code
sequences or other techniques. See CHAP and PAP.
A
UTHORIZATION
—
The process of determining what types of activities or access are permitted on
a network. Usually used in the context of authentication: once you have authenticated a user,
they may be authorized to have access to a specific service.
C
O
S —
Class of Service—Describes the level of service provided to a user. Also provides a way of
managing traffic in a network by grouping similar types of traffic.
D
ATABASE
—
An organized collection of Oware objects.
D
EPLOYMENT
—
The distribution of solution blades throughout the domain.
D
IGITAL
C
ERTIFICATE
—
A digital certificate is an electronic “credit card” that establishes your
credentials when doing business or other transactions on the Web. It is issued by a certification
authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate
holder's public key (used for encrypting and decrypting messages and digital signatures), and the
digital signature of the certificate-issuing authority so that a recipient can verify that the certifi-
cate is real.
D
OMAIN
—
A goal-oriented environment that can include an industry, company, or department.
You can use Oware to create solutions within your particular domain.
E
NCRYPTION
—
Scrambling data in such a way that it can only be unscrambled through the
application of the correct cryptographic key.
E
QUIPMENT
—
A network device managed by the system.
E
THERNET
T
RUNK
—
An Ethernet Trunk service represents a point-to-point connection between
two ports of two devices. Ethernet frames transported by the connection are encapsulated
according to IEEE 802.1Q protocol. The each tag ID value in 802.1Q encapsulated Ethernet
frames distinguishes an Ethernet traffic flow. Thus, an Ethernet trunk can aggregate multiple
Ethernet VLANs through a same connection which is why “trunk” describes these.
Summary of Contents for OpenManage Network Manager
Page 1: ...Dell OpenManage Network Manager version 5 1 Web Client Guide ...
Page 14: ...14 A Note About Performance Preface ...
Page 98: ...98 Schedules Portal Conventions ...
Page 142: ...142 Vendors Key Portlets ...
Page 232: ...232 File Management File Servers ...
Page 242: ...242 Deploy Configuration ...
Page 290: ...290 Key Metric Editor Monitoring Metrics This panel s display depends on the selected device ...
Page 340: ...340 ...
Page 374: ...374 Adaptive CLI Records Archiving Policy Actions and Adaptive CLI ...
Page 380: ...380 Glossary ...
Page 388: ...388 388 Index ...