Appendix E: Glossary - Extreme Networks AG200 User Manual

Version 5.0
Table of Contents

Advertisement

E
Glossary
802.1X
NAC policies
NAC policy group
ACL
ACS
ActiveX
agent
API
backdoor
Sentriant AG Users' Guide, Version 5.0
A port-based authentication protocol that can dynamically vary
encryption keys, and has three components: a supplicant, an
authenticator, and an authentication server.
In Sentriant AG, NAC policies consist of individual tests that evaluate
endpoints attempting to access the network. These tests assess
operating systems, verify that key hotfixes and patches have
been installed, ensure anti-virus and other security applications
are present and up-to-date, detect the presence of worms,
trojans, and viruses, and check for potentially dangerous
applications such as file sharing, peer-to-peer (P2P), or
spyware.
A logical grouping of NAC policies.
Access control list
A list or set of rules that routers (and other
networking endpoints) use to control and regulate access
through the endpoint and subsequently onto the network.
Access Control Server
A Microsoft technology that enables interactive Web content.
An information exchange process that works in conjunction with
clients and servers to perform tasks.
Application Programming Interface
A disguised or hidden entry point in a software program or system.
An open backdoor can be intentional (for maintenance use), or
unintentional. If a backdoor is discovered, malicious users or
software can gain entry and cause damage.
407

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag

Table of Contents