G-1
G
Glossary
The following terms and definitions are used in this book, and in other
ProCurve Management Software documentation.
802.1X:
A port-based authentication protocol that can dynamically
vary encryption keys, and has three components: a supplicant,
an authenticator, and an authentication server.
ACL:
Access control list – A list or set of rules that routers (and
other networking endpoints) use to control and regulate
access through the endpoint and subsequently onto the net-
work. In NAC 800, using this option restricts the network
access of non-compliant endpoints by assigning DHCP set-
tings on a quarantined network.
ACPI:
Advanced Configuration and Power Interface – A specifica-
tion that establishes standard interfaces.
ACS:
Access Control Server – A server that controls access to your
system. A Cisco® access policy control platform.
AD:
Active Directory – A directory service included with
Microsoft® Windows Server 2003 that allows administrators
to manage end-user access to the network.
ActiveX:
A Microsoft technology that enables interactive Web content.
agent:
An information exchange process that works in conjunction
with clients and servers to perform tasks.
agentless credentials:
When NAC 800 accesses and tests endpoints, it needs to know
the administrator credentials for that endpoint. If your net-
work uses a Windows domain controller and the connecting
endpoint is a member of a configured domain, NAC 800 uses
the information supplied to access and test the endpoint.
AP:
Access Point – The physical point at which an endpoint or
device connects to a network.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......