131
Fortress : Glossary
groups An association of network objects (users, devices, etc.). Groups are typically used to
allocate shared resources and apply access policies.
GUI Graphical User Interface
guest In Fortress Technologies, a guest user as configured in MaPS.
Alternatively, in the Fortress Controller, devices given access on the encrypted (WLAN)
side of the network as Trusted Devices, access points, or guests.
host In Fortress Technologies, devices on the unencrypted (LAN) side of the network.
HTTP Hypertext Transfer Protocol—used to transmit and receive all data over the W orld Wide
Web.
IANA Internet Assigned Number Authority—the organization that assigns Internet Protocol
(IP) addresses and port numbers.
ICMP Internet Control Message Protocol —supports packets containing error, control, and
informational messages. The ping command uses ICMP to test an Internet connection.
IDS Intrusion Detection System—monitors network activity to identify suspicious patterns
that may indicate a network or system attack and supports automated and/or manual
real-time responses.
IEEE Institute of Electrical and Electronics Engineers—a nonprofit technical professional
association that develops, promotes, and reviews standards within the electronics and
computer science industries.
IETF Internet Engineering Task Force—the primary standards organization for the Internet.
IP Internet Protocol—defines a method for transmitting data, in packets, from one com-
puter to another over a network, one of the two primary protocols implemented in TCP/
IP networks.
IPS Intrusion Prevention System—allows network administrators to apply policies and rules
to network traffic, as it is monitored by an intrusion detection system.
IPsec Internet Protocol security—a set of protocols developed by the IETF to support secure
exchange of packets at the IP layer, deployed widely to implement VPNs.
ISO International Organization for Standardization, formerly the International Standards
Organization—ISO still refers to standards (ex., ISO 9000); the whole name refers to
the organization, sometimes appending the earlier initialization in parentheses.
IT Information Technology
ITU-T International Telecommunications Union-Telecommunication, Gene va-based interna-
tional organization for telecommunications standards, formerly CCITT.
key establishment An transaction through which two parties with no prior knowledge of one another can
agree upon a shared secret key for symmetric key encryption of data over an insecure
channel. Sometimes, key exchange
LAN Local Area Network—a collection of computers located within a small geographic area
(such as an office building) that shares a common communications infrastructure and
network resources (i.e., printers, servers, etc.).
Layer 2 Refer to DLC.
LDAP
Lightweight Directory Access Protocol—a protocol used to access directories on a net-
work, including the Internet. LDAP makes it possible to search compliant directories to
locate information and resources on a network. LDAP is a streamlined version of the
Directory Access Protocol, part of the X.500 standard for network directory services.
LLC Logical Link Control—one of two sublayers of OSI Layer 2 (refer to
DLC
), in which frame
synchronization, flow control and error checking takes place.
MAC Media Access Control—one of two sublayers of the OSI Model’s DLC, at which data
access and transmission permissions are controlled.
MAC address Media Access Control address—a unique number that identifies a device, used to prop-
erly direct network traffic to the device.
MaPS™ Refer to Fortress MaPS.