Glossary
G-5
IDE:
Integrated Drive Electronics – A standard storage connection
interface known as Advanced Technology Attachment (ATA).
IDS/IPS:
Intrusion Detection System/Intrusion Prevention System –
IDS and IPS systems detect and prevent attacks on your
system. In NAC 800 you can configure these external systems
so that they can request that NAC 800 quarantine an endpoint
after it has been connected (post-connect) when unwanted
behavior is detected.
IE:
Internet Explorer
IM:
Instant Messenging
inline:
An installation of NAC 800 where it is placed on the network
and all traffic to be quarantined passes through NAC 800.
IP:
Internet protocol – A protocol by which data is sent from one
computer to another on the Internet.
IPSec:
IP security
iptables:
A Linux package used to manage packet filtering and Network
Address Translation (NAT).
ISO image file:
An image of a CD saved in ISO 9660 standard format.
IT:
Information Technology
Java:
A programming language derived from C and C++.
JMS:
Java Message Service – A Java-based message interface.
JVM:
Java Virtual Machine – A set of programs that converts Java
bytecode into machine language.
L2TP:
Layer two tunneling protocol – An open standard protocol
used to create virtual private networks (VPN).
LAN:
Local Area Network
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......