Appendix A: Glossary

Steel-BeltedAn implementation of RADIUS developed by Funk Software then later pur- Radius chased by Juniper Networks. For more information, see Juniper Networks at

http://www.juniper.net.

STP Spanning Tree Protocol. A protocol that eliminates network loops by de- activating redundant connections. It is currently being revised into RSTP, which is a faster version of STP. For more information, see IEEE 802.1D at http://www.ieee802.org/1/pages/802.1D-2003.html.

supplicant The component of 802.1X that requests access to a network. It communicates with the RADIUS server to submit an end-user’s credentials (and also to authen- ticate the RADIUS server to the endpoint). An endpoint must have an 802.1X supplicant to connect to a segment of the network that enforces 802.1X quarantining. Supplicants supported by the NAC 800 include native suppli- cants on Windows Vista, XP SP2, and 2000 SP4; MAC OS 10.3; as well as Juniper Odyssey 4.2 and Open1X Xsupplicant 1.2.8.

symmetric A type of algorithm wherein the same key is used both to encrypt and decrypt.

T

TACACS+ Terminal Access Controller Access Control System Plus. An authentication protocol that uses TCP. (RADIUS uses UDP.)

Telnet TELephone NETwork. A TCP/IP protocol that provides a fairly general, bi- directional, 8-bit,byte-oriented communications facility. It is typically used to provide user-orientedcommand-line login sessions between hosts on the Internet. The name “Telnet” came about because the protocol was designed to emulate a single terminal attached to the other computer. For more infor- mation, see RFC 854 at http://www.ietf.org/rfc/rfc0854.txt.

temporary access The time during which an endpoint is allowed access to the network, overriding period the endpoint’s quarantine status. The network administrator configures the

length of this period.

testing methods Methods that the NAC 800 uses to perform tests. The NAC 800 supports three testing methods: NAC agent test method, ActiveX test method, and agentless test method.

TKIP Temporal Key Integrity Protocol. A link-layer security protocol that is used in WPA to correct deficiencies in WEP. For more information, see http://

standards.ieee.org/getieee802/download/802.11i-2004.pdf.

A-21

Page 291
Image 291
HP Access Control Client Software manual Appendix a Glossary