Appendix A: Glossary

NAT-TNAT-Traversal. An IKE method for UDP encapsulation of ESP packets so that they pass better through firewalls. For more information, see RFC 3947 at http://tools.ietf.org/html/rfc3947 and RFC 3948 at http://tools.ietf.org/html/ rfc3948.

network access A security implementation that attempts to control access to a network by control enforcing security policies, restricting prohibited traffic types, identifying and

containing end-users that break rules or are noncompliant with policies, and stopping and mitigating security threats.

network access See NAC. controllernetwork access See NAS. server

NIC Network Interface Card. A printed circuit board that includes a cable jack or an antenna that gives a computing device access to a network. Every NIC has an address (MAC address) that is unique to that card.

NIS Network Information Service. A Sun Microsystems client-server directory service protocol to communicate information such as host and client names throughout a network. This protocol is used on UNIX networks.

O

OpenLDAP A free, open-source version of LDAP that is platform-independent. For more information, see the official Web site at http://www.openldap.org.

OTP One-Time Password. A type of password that is used one time only. The password is usually generated according to a preset function (such as time of day) that only the password generator and authenticator know.

P

P2P Peer-to-Peer. A P2P network is comprised of peer nodes rather than clients and servers. P2P software allows end-users to connect directly to other end- users and is used for file sharing. Many P2P software packages are considered spyware, and their use can be discouraged or even prohibited by corporate policies.

A-15