
A-24
Appendix A: Glossary
computer resources such as hard drive space, memory, and processor cycles.
Like biological viruses, they can modify themselves upon replication to avoid
easy detection.
VLAN
Virtual Local Area Network
. A standard that enables network administrators
to group end-users by logical function rather than by physical location. VLANs
are created on switches to segment networks into smaller broadcast domains,
enhance network security, and simplify network management. For more
information, see IEEE 802.1Q at
http://www.ieee802.org/1/pages/
802.1Q.html
.
W
Web-Auth
A method for authenticating end-users that does not require a client utility on
the endpoints. The NAS redirects end-users to a Web page in which the end-
users submit their credentials. The
NAS
retrieves the credentials and submits
them to an authentication server.
WEP
Wired Equivalent Privacy
. A protocol that is part of the IEEE 802.11 suite of
protocols for wireless LANs. Its purpose is to provide security equivalent to
an unsecured wired LAN. It has been superseded by
WPA
and
IEEE 802.11i
. For
more information, see IEEE 802.11 at
http://standards.ieee.org/getieee802/
802.11.html.
whitelist
A list of endpoints and Windows domains that will always be allowed onto the
network and will never be tested.
wildcard
On the NAC 800, the asterisk (*) is the wildcard character.
Windows
The desktop and server operating system developed by Microsoft. The ver-
sions of Windows that are supported by the NAC 800 are Windows 98,
Windows 2000, Windows XP Professional and Home, Windows Server 2000
and 2003, and Windows NT.
Wireless Edge
Services Module
A ProCurve product that is used to manage wireless LANs. The Wireless Edge
Services Module, which is installed in a switch, controls many RPs (coordi-
nated APs).
worm
A computer worm is a self-replicating computer program similar to a com-
puter
virus
. While a virus attaches itself to and becomes part of another
executable program, a worm is self-contained and does not need to be part of
another program to propagate. Worms often exploit file transmission capabil-
ities found on many computers, using networks to send copies of themselves
to other systems without any intervention. In general, worms harm the net-
Содержание 800
Страница 1: ...Configuration Guide www procurve com ProCurve Network Access Controller 800 ...
Страница 2: ......
Страница 3: ...ProCurve Network Access Controller 800 Configuration Guide April 2008 1 0 30398 ...
Страница 74: ...1 62 Overview of the ProCurve NAC 800 Deployment Methods ...
Страница 145: ...3 17 Initial Setup of the ProCurve NAC 800 System Settings Figure 3 9 Home System Configuration Management Server ...
Страница 155: ...3 27 Initial Setup of the ProCurve NAC 800 System Settings ...
Страница 194: ...3 66 Initial Setup of the ProCurve NAC 800 Digital Certificates ...
Страница 328: ...5 64 Configuring the RADIUS Server Without Identity Driven Manager Manage Digital Certificates for RADIUS ...
Страница 336: ...6 8 Disabling Endpoint Integrity Testing Overview ...
Страница 354: ...7 18 Redundancy and Backup for RADIUS Services Back Up Your NAC 800 Configuration ...
Страница 380: ...A 26 Appendix A Glossary ...
Страница 394: ...B 14 Appendix B Linux Commands Service Commands ...
Страница 405: ......
Страница 406: ... Copyright 2007 2008 Hewlett Packard Development Company L P April 2008 Manual Part Number 5991 8618 ...