HP Sygate Security Agent User Guide

DLL fingerprint: A 128-bit number that is generated by performing an MD5 hash of an entire DLL packet. It is unique for each DLL. The MD5 hash or fingerprint of each DLL is stored on the Sygate Security Agent and forwarded to the Sygate Management Server. If the DLL is changed in any way, the DLL fingerprint changes. See also DLL, DLL authentication, MD5 hash.

domain: A group of computers that are part of a network and share a common directory database. Each domain has a unique name and is organized in levels that are administered as a unit using common rules.

domain name: The name by which a group of computers is known to the network. Most organizations have a unique name on the Internet that allows individuals, groups, and other organizations to communicate with them. See also domain.

DoS attack: See Denial of Service (DoS).

driver-level protection: A Sygate software feature that blocks protocol drivers from gaining access to the network unless a user gives permission. If a protocol driver attempts to gain access to the network through a client running the Sygate Security Agent, depending on the rule set, the protocol driver is allowed, blocked, or a pop-up message displays. See also protocol driver blocking.

Dynamic Host Configuration Protocol (DHCP): A TCP/IP protocol that provides dynamic configuration of host IP addresses and enables individual computers on an IP network to extract configuration parameters from a DHCP server. DHCP lets a system administrator supervise and distribute IP addresses from a central point in the network.

E

EAP: Extensible Authentication Protocol. Sits inside of PPP’s authentication protocol and provides a generalized framework for several different authentication methods. EAP is used to pass the authentication information between the supplicant (the wireless workstation) and the authentication server. The actual authentication is defined and handled by the EAP type. The access point acting as authenticator is only a proxy to allow the supplicant and the authentication server to communicate.

encryption: The use of an algorithm to convert typically sensitive data into a form that is

unreadable except by authorized users. See also Communications Channel Encryption.

endpoint: Any network device that connects to the enterprise network and runs network- based applications. Network devices can include laptops, desktop computers, servers, and PDAs. See also access point.

54