Glossary

A

access point: A network connection that allows a computer or user to connect to an enterprise network. Virtual Private Networks (VPNs), wireless communications, and Remote Access Service (RAS) dial-up connections are examples of access points. See also end point, wireless access point (wireless AP).

Active Response: The ability to automatically block the IP address of a known intruder for a specific amount of time. The amount of time that a Security Agent blocks an intruder’s IP address can be modified to any interval from 1 to 65,000 seconds. By the way, a Trojan is not considered an attack because it is a program running on the same computer on which a Security Agent has detected a Trojan.

adapter: See network adapter.

Advanced rule: A rule that can be added on an Agent to enforce a security policy. Advanced Rules can exhibit complex relationships between applications, IP addresses, and services. See also firewall rule, simple rule.

Agent: A device running HP Sygate Security Agent software is also called an Agent device.

Anti-IP Spoofing: An advanced setting that prevents an intruder from taking advantage of the ability to forge (or spoof) an individual’s IP address. See also IP Spoofing.

Anti-MAC Spoofing: An advanced setting that prevents an intruder from taking advantage

of the ability to forge (or spoof) a Media Access Control (MAC) address of a computer. Anti-MAC Spoofing allows incoming and outgoing ARP (Address Resolution Protocol) traffic only if an ARP request has been made to a specific host. It blocks all other unexpected ARP traffic and logs it in a Security Log. See also Smart ARP, MAC address, MAC Spoofing.

51