Glossary
A
access point:
A network connection that allows a computer or user to connect to an
enterprise network. Virtual Private Networks (VPNs), wireless communications, and
Remote Access Service (RAS) dial-up connections are examples of access points. See
also end point, wireless access point (wireless AP).
Active Response:
The ability to automatically block the IP address of a known intruder for
a specific amount of time. The amount of time that a Security Agent blocks an
intruder’s IP address can be modified to any interval from 1 to 65,000 seconds. By
the way, a Trojan is not considered an attack because it is a program running on the
same computer on which a Security Agent has detected a Trojan.
adapter:
See network adapter.
Advanced rule:
A rule that can be added on an Agent to enforce a security policy.
Advanced Rules can exhibit complex relationships between applications, IP
addresses, and services. See also firewall rule, simple rule.
Agent:
A device running HP Sygate Security Agent software is also called an Agent device.
Anti-IP Spoofing:
An advanced setting that prevents an intruder from taking advantage of
the ability to forge (or spoof) an individual’s IP address. See also IP Spoofing.
Anti-MAC Spoofing:
An advanced setting that prevents an intruder from taking advantage
of the ability to forge (or spoof) a Media Access Control (MAC) address of a
computer. Anti-MAC Spoofing allows incoming and outgoing ARP (Address
Resolution Protocol) traffic only if an ARP request has been made to a specific host.
It blocks all other unexpected ARP traffic and logs it in a Security Log. See also
Smart ARP, MAC address, MAC Spoofing.
51