Appendix A: Glossary

enabled on the endpoint, that ports 137, 138, 139, and 445 be open on the endpoint’s firewall, that the endpoint’s browser security settings allow Java scripting, and that administrator credentials be known for the endpoint.

AH Authentication Header. A part of the IPsec protocol suite that guarantees connectionless integrity and data origin authentication of IP datagrams. See also ESP.

AP Access Point. A network component that receives and sends wireless LAN signals to wireless network cards through its anntena(s). An AP is functionally equivalent to a switch.

asymmetric A type of encryption algorithm wherein one key is used to encrypt and a different key is used to decrypt.

authentication The process of confirming an endpoint’s or an end-user’s identity before granting a network connection. Authentication can be implemented through the use of passwords, keys, or digital certificates. A RADIUS or TACACS+ server can handle authentication for the entire network.

authentication Protocols that allow the peers in a connection to verify each other’s identity. protocols In the PPP protocol suite, authentication protocols include PAP, CHAP, and EAP.

authentication A server whose function it is to authenticate end-users and endpoints. In the server 802.1X framework, the component that decides whether to grant an end-user

access.

authenticator The component of the 802.1X framework that enforces authentication and authorization. When an endpoint connects to the authenticator, the authentica- tor forces it to authenticate to the network. The authenticator passes the endpoint’s supplicant messages to the authentication server and enforces the decisions made by that server. These decisions include whether the endpoint is allowed any access at all as well as the level of access. Also called the 802.1X device (in the NAC 800 Web browser interface) and NAS (in the RADIUS protocol). See also 802.1X device and NAS.

authorization The process of controlling the network resources and services that an end- user can access, usually based on the end-user’s identity; with the NAC 800, authorization is also based on endpoint integrity. A RADIUS or TACACS+ server or a NAC 800 can act as an authorization server. Authorization is sometimes called “access control” although access control is properly broader than authorization alone.

A-5

Page 275
Image 275
HP Access Control Client Software manual Appendix a Glossary