Appendix A: Glossary

H

hash A number generated by running a string of text through an algorithm. The hash is substantially smaller than the text itself and is unique, because algorithms transform data in such a way that it is extremely unlikely that some other text will produce the same hash value. The hash is also irreversible: the encryption cannot be reversed to obtain the original text.

HMAC keyed-HashMAC. A type of MAC that is calculated with a hash function and a secret key. It can be used to verify both data integrity and authenticity. For more information, see RFCs 2104 and 2202 at http://tools.ietf.org/html.

I

IANA Internet Assigned Numbers Authority. An organization whose purpose is to assign IP addresses, manage DNS root zones, and make other IP assignments.

IAS Internet Authentication Services. The Microsoft implementation of RADIUS.

IDM Identity Driven Manager. A ProCurve Networking application that provides management of user-based profiles (including ACLs, QoS settings, and rate limits). IDM assigns various profiles to end-users based on their identity (community), access time, access location, and endpoint integrity posture.

IE Microsoft’s Internet Explorer browser.

IGMP Internet Group Management Protocol. A protocol that is used to manage IP multicast groups. It is often used for online video and gaming.

IKE Internet Key Exchange. A protocol that is used to set up a security association in the IPsec protocol suite.

IMSI International Mobile Subscriber Identity. A unique number that is stored in

aSIM and is used by GSM and UMTS mobile telephones. The number helps locate the phone and acquire other information.

inline deployment The NAC 800 is placed between a “choke point” and the rest of the network method such that all traffic to be quarantined passes through the NAC 800. See also

inline quarantine method.

inline quarantine A quarantine method that relies on the NAC 800’s placement in the network. method The NAC 800 functions as a Layer 2 bridge that imposes a firewall between its

Ethernet port 1 and port 2. Only traffic from endpoints whose integrity posture is “Healthy” or “Check-Up” can pass through the NAC 800.

A-11

Page 281
Image 281
HP Access Control Client Software manual Inline quarantine method