Novell ZENWORKS NETWORK ACCESS CONTROL 5.0 - 09-22-2008 User Manual page 531

Table of Contents

Advertisement

P2P
Person-to-person or Peer-to-peer — A Peer-to-peer (P2P) network is one that is comprised
of peer nodes (computers) rather than clients and servers. These peer nodes function both
as clients and servers to other nodes and can perform any client or server function. P2P
software allows users to connect directly to other users and is used for file sharing. Many
P2P software packages are considered spyware and their use is generally discouraged.
PDA
Personal Digital Assistant — A small, portable electronic device that includes features
normally found on a computer, cell phone, music player, and other functionality.
ping
Packet InterNet Groper — A utility used to test the connection to a host.
post-connect
Post-connect in Novell ZENworks Network Access Control provides an interface where you
can configure external systems, such as IDS/IPS, that request quarantining of an endpoint
based on activity that occurs after the endpoint has connected to the network (post-
connect).
PPTP
Point-to-point tunneling protocol — A tunneling protocol used to connect Windows NT
clients and servers.
quarantine
In Novell ZENworks Network Access Control, isolating endpoints or systems to prevent
potential infection of other endpoints or systems.
RADIUS
Remote Authentication Dial-In User Service
RAM
Random access memory
RAS
Remote access server
RDAC
Remote Device Activity Capture
RDBMS
Relational Database Management System (RDBMS) — Used to store information in
related tables.
RPC
Remote procedure call — a procedure where arguments or parameters are sent to a
program on a remote system. The remote program executes and returns the results.
RPM
Redhat package manager
Glossary 531

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks network access control 5.0

Table of Contents