A-23
Appendix A: Glossary
The other type of Trojan is a standalone program that masquerades as some-
thing else, such as program that claims to rid your hard drive of viruses but in
fact inserts them.
U
UDP
User Datagram Protocol
. A stateless protocol that is part of the IP protocol
suite. Using UDP, programs on network computers can send datagrams to one
another. UDP does not provide the reliability and ordering guarantees that
TCP
does; datagrams may arrive out of order or go missing without notice. How-
ever, UDP is faster and more efficient for many lightweight or time-sensitive
programs. For more information, see RFC 768 at
http://www.ietf.org/rfc/
rfc0768.txt
.
USB
Universal Serial Bus
. A serial bus standard for interface devices. It was
designed for computers, but its popularity has made it commonplace on video
game consoles, PDAs, cell phones, MP3 players, portable memory devices,
and even on televisions and home stereo equipment
unmanaged
endpoint
A device that is not under the company’s administrative control. Examples
include a guest’s computer or a contractor’s computer. Such a device is still
subject to the company’s network security policies.
untestable
endpoint
A device that is running an operating system that the NAC 800 does not
currently support or whose Internet Explorer security setting is “High.”
user role
NAC 800 management permissions that are granted to end-users. Four pre-
defined roles are included with the NAC 800: See Table 3-1 for predefined user
roles. New user roles can also be created.
V
VI
A display-oriented interactive text editor that was created for Unix systems.
For more information, see the original document at
http://webauth.stan-
ford.edu/protocol.html
.
virus
A computer program that can copy itself and damage a computer system. A
virus cannot self-propagate as a
worm
can but is spread via infected removable
media (floppy disks, zip drives, USB drives) or by sending it over a network.
Viruses can be programmed to do all kinds of damage, such as erasing hard
drives, deleting files, or corrupting executables, or they can be relatively
benign (showing text or a graphic), but even the benign viruses use up
Содержание 800
Страница 1: ...Configuration Guide www procurve com ProCurve Network Access Controller 800 ...
Страница 2: ......
Страница 3: ...ProCurve Network Access Controller 800 Configuration Guide April 2008 1 0 30398 ...
Страница 74: ...1 62 Overview of the ProCurve NAC 800 Deployment Methods ...
Страница 145: ...3 17 Initial Setup of the ProCurve NAC 800 System Settings Figure 3 9 Home System Configuration Management Server ...
Страница 155: ...3 27 Initial Setup of the ProCurve NAC 800 System Settings ...
Страница 194: ...3 66 Initial Setup of the ProCurve NAC 800 Digital Certificates ...
Страница 328: ...5 64 Configuring the RADIUS Server Without Identity Driven Manager Manage Digital Certificates for RADIUS ...
Страница 336: ...6 8 Disabling Endpoint Integrity Testing Overview ...
Страница 354: ...7 18 Redundancy and Backup for RADIUS Services Back Up Your NAC 800 Configuration ...
Страница 380: ...A 26 Appendix A Glossary ...
Страница 394: ...B 14 Appendix B Linux Commands Service Commands ...
Страница 405: ......
Страница 406: ... Copyright 2007 2008 Hewlett Packard Development Company L P April 2008 Manual Part Number 5991 8618 ...