
Appendix A: Glossary
enabled on the endpoint, that ports 137, 138, 139, and 445 be open on the endpoint’s firewall, that the endpoint’s browser security settings allow Java scripting, and that administrator credentials be known for the endpoint.
AH Authentication Header. A part of the IPsec protocol suite that guarantees connectionless integrity and data origin authentication of IP datagrams. See also ESP.
AP Access Point. A network component that receives and sends wireless LAN signals to wireless network cards through its anntena(s). An AP is functionally equivalent to a switch.
asymmetric A type of encryption algorithm wherein one key is used to encrypt and a different key is used to decrypt.
authentication The process of confirming an endpoint’s or an
authentication Protocols that allow the peers in a connection to verify each other’s identity. protocols In the PPP protocol suite, authentication protocols include PAP, CHAP, and EAP.
authentication A server whose function it is to authenticate
access.
authenticator The component of the 802.1X framework that enforces authentication and authorization. When an endpoint connects to the authenticator, the authentica- tor forces it to authenticate to the network. The authenticator passes the endpoint’s supplicant messages to the authentication server and enforces the decisions made by that server. These decisions include whether the endpoint is allowed any access at all as well as the level of access. Also called the 802.1X device (in the NAC 800 Web browser interface) and NAS (in the RADIUS protocol). See also 802.1X device and NAS.
authorization The process of controlling the network resources and services that an end- user can access, usually based on the