Extreme Networks Sentriant AG Software User's Manual page 477

Hide thumbs Also See for Sentriant AG:
Table of Contents

Advertisement

O
OUI
P
P2P
PDA
ping
post-connect
PPTP
Q
quarantine
R
RADIUS
RAM
RAS
RDAC
RDBMS
Sentriant AG Software Users Guide, Version 5.3
Organizational unique identifier - The first 24 bits of a MAC address
for a network-connected device, which indicate the specific vendor for
that device.
Person-to-person or Peer-to-peer—A Peer-to-peer (P2P) network is one
that is comprised of peer nodes (computers) rather than clients and
servers. These peer nodes function both as clients and servers to other
nodes and can perform any client or server function. P2P software
allows users to connect directly to other users and is used for file
sharing. Many P2P software packages are considered spyware and
their use is generally discouraged.
Personal Digital Assistant—A small, portable electronic device that
includes features normally found on a computer, cell phone, music
player, and other functionality.
Packet InterNet Groper—A utility used to test the connection to a host.
Post-connect in Sentriant AG provides an interface where you can
configure external systems, such as IDS/IPS, that request quarantining
of an endpoint based on activity that occurs after the endpoint has
connected to the network (post-connect).
Point-to-point tunneling protocol—A tunneling protocol used to
connect Windows NT clients and servers.
In Sentriant AG, isolating endpoints or systems to prevent potential
infection of other endpoints or systems.
Remote Authentication Dial-In User Service
Random access memory
Remote access server
Remote Device Activity Capture
Relational Database Management System (RDBMS)—Used to store
information in related tables.
Glossary
477

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag 5.3

Table of Contents