
A-20
Appendix A: Glossary
RSTP
Rapid Spanning Tree Protocol
. An evolution of
STP
that provides for faster
spanning-tree convergence after a topology change. RSTP prevents broadcast
storms (unintentional DoS attacks) that arise from redundant network links
in an OSI Layer 2 switched network. For more information, see IEEE 802.1D-
2004 at
http://standards.ieee.org/getieee802/download/802.1D-2004.pdf
.
S
SA
Security Association
. Secure communication between two network devices
that is created from shared security information. SA is used in
IKE
. For more
information, see RFC 4306
at http://tools.ietf.org/html/rfc4306
.
SCP
Secure Copy Protocol
. Encrypts data packets over an
SSH
connection.
SFTP
Secure File Transfer Protocol
. Supersedes SCP in many applications. For
more information on SFTP, see the Internet Draft at
http://tools.ietf.org/html/
draft-ietf-secsh-filexfer-13
.
shared secret
Any authentication information such as a password that is “known” by two or
more network devices. The shared secret is identical on both devices.
signature-based
detection
Attack detection that compares audit data with known attack signatures
stored in a signature database. Signature-based
IDS
s recognize and interpret
series of packets consistent with past intrusions as new attacks.
SMB
Server Message Block
. An application-layer network protocol that provides
shared access to files, printers, serial ports, and miscellaneous communica-
tions between nodes on a network.
SNMP
Simple Network Management Protocol
. An application-layer protocol that
supports the exchange of management information between network devices.
An SNMP network consists of agents, managed devices, and network-manage-
ment systems. Hierarchically organized information about network devices is
stored in and accessed from a
MIB
. The NAC 800 supports SNMPv2, which
controls access based on community. For example, a server that knows the
NAC 800’s read-only community name can read. For more information, see
RFC 1157 at
http://www.ietf.org/rfc/rfc1157.txt
.
spyware
A broad category of malicious software designed to intercept or take partial
control of a computer’s operation without the informed consent of that
machine’s owner or legitimate user. While the term literally suggests software
that surreptitiously monitors the user’s actions, it has come to refer more
broadly to software that subverts the computer’s operation for the benefit of
a third party.
Содержание 800
Страница 1: ...Configuration Guide www procurve com ProCurve Network Access Controller 800 ...
Страница 2: ......
Страница 3: ...ProCurve Network Access Controller 800 Configuration Guide April 2008 1 0 30398 ...
Страница 74: ...1 62 Overview of the ProCurve NAC 800 Deployment Methods ...
Страница 145: ...3 17 Initial Setup of the ProCurve NAC 800 System Settings Figure 3 9 Home System Configuration Management Server ...
Страница 155: ...3 27 Initial Setup of the ProCurve NAC 800 System Settings ...
Страница 194: ...3 66 Initial Setup of the ProCurve NAC 800 Digital Certificates ...
Страница 328: ...5 64 Configuring the RADIUS Server Without Identity Driven Manager Manage Digital Certificates for RADIUS ...
Страница 336: ...6 8 Disabling Endpoint Integrity Testing Overview ...
Страница 354: ...7 18 Redundancy and Backup for RADIUS Services Back Up Your NAC 800 Configuration ...
Страница 380: ...A 26 Appendix A Glossary ...
Страница 394: ...B 14 Appendix B Linux Commands Service Commands ...
Страница 405: ......
Страница 406: ... Copyright 2007 2008 Hewlett Packard Development Company L P April 2008 Manual Part Number 5991 8618 ...