Glossary
G-3
client:
A computer that requests services from another (server).
cluster:
A logical grouping of ESs.
compliance:
Meets defined standards or conditions.
CSR:
Certificate Signing Request – A request sent by a system when
applying for a public key certificate.
CTA:
Cisco Trust Agent
DAC:
Device Activity Capture – A utility used that listens or sniffs
the network for DHCP traffic and can be configured to dis-
cover other types of IP traffic if needed (such as from static
IP addresses)
.
DC:
Domain controller – A server that manages and controls the
activities (such as user access) in the domain.
DHCP:
Dynamic Host Configuration Protocol – A method of assigning
IP addresses to endpoints as they connect to the network, and
releasing them as the endpoints disconnect from the network.
DHCP allows administrators to manage IP addresses from one
location rather than at each endpoint.
DLL:
Dynamic Link Library – A shared library file used in Microsoft
systems. These files have the DLL extension.
DMA:
Direct Memory Access – A feature in computers where mem-
ory can be accessed without going through the CPU.
DN:
Distinguished Name – In the Lightweight Directory Access
Protocol (LDAP), objects are referenced by their DN.
DNS:
Domain name server – A computer that translates domain
names (such as mycompany.com) into IP addresses (such as
216.239.41.99).
EULA:
End user license agreement – An agreement that is included
with a product or displayed on the screen when first used.
Summary of Contents for ProCurve NAC 800
Page 1: ...HP ProCurve Network Access Controller 800 Users Guide ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 71: ...System Configuration Management Server 3 23 Figure 3 9 System Configuration Management Server ...
Page 80: ...System Configuration User Accounts 3 32 Figure 3 12 System Configuration User Accounts ...
Page 88: ...System Configuration User Roles 3 40 Figure 3 16 System Configuration User Roles ...
Page 180: ... This page intentionally left blank ...
Page 208: ... This page intentionally left blank ...
Page 234: ...End user Access Mac OS X Endpoint Settings 5 26 Figure 5 14 Mac System Preferences ...
Page 288: ... This page intentionally left blank ...
Page 302: ... This page intentionally left blank ...
Page 306: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 307: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 309: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 312: ... This page intentionally left blank ...
Page 315: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 318: ... This page intentionally left blank ...
Page 323: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 324: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 380: ... This page intentionally left blank ...
Page 418: ... This page intentionally left blank ...
Page 425: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 459: ...System Administration Creating and Replacing SSL Certificates 15 31 10 Save and exit the file ...
Page 468: ... This page intentionally left blank ...
Page 480: ... This page intentionally left blank ...
Page 526: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 532: ... This page intentionally left blank ...
Page 562: ... This page intentionally left blank ...