Fortress Technologies ecure Wireless Access Bridge User Manual

Page 141

Advertising
background image

131

Fortress : Glossary

groups

An association of network objects (users, devices, etc.). Groups are typically used to
allocate shared resources and apply access policies.

GUI Graphical User Interface

guest

In Fortress Technologies, a guest user as configured in MaPS.
Alternatively, in the Fortress Controller, devices given access on the encrypted (WLAN)
side of the network as Trusted Devices, access points, or guests.

host In Fortress Technologies, devices on the unencrypted (LAN) side of the network.

HTTP

Hypertext Transfer Protocol—used to transmit and receive all data over the World Wide
Web.

IANA

Internet Assigned Number Authority—the organization that assigns Internet Protocol
(IP) addresses and port numbers.

ICMP

Internet Control Message Protocol —supports packets containing error, control, and
informational messages. The ping command uses ICMP to test an Internet connection.

IDS

Intrusion Detection System—monitors network activity to identify suspicious patterns
that may indicate a network or system attack and supports automated and/or manual
real-time responses.

IEEE

Institute of Electrical and Electronics Engineers—a nonprofit technical professional
association that develops, promotes, and reviews standards within the electronics and
computer science industries.

IETF Internet Engineering Task Force—the primary standards organization for the Internet.

IP

Internet Protocol—defines a method for transmitting data, in packets, from one com-
puter to another over a network, one of the two primary protocols implemented in TCP/
IP networks.

IPS

Intrusion Prevention System—allows network administrators to apply policies and rules
to network traffic, as it is monitored by an intrusion detection system.

IPsec

Internet Protocol security—a set of protocols developed by the IETF to support secure
exchange of packets at the IP layer, deployed widely to implement VPNs.

ISO

International Organization for Standardization, formerly the International Standards
Organization—ISO still refers to standards (ex., ISO 9000); the whole name refers to
the organization, sometimes appending the earlier initialization in parentheses.

IT Information Technology

ITU-T

International Telecommunications Union-Telecommunication, Geneva-based interna-
tional organization for telecommunications standards, formerly CCITT.

key establishment

An transaction through which two parties with no prior knowledge of one another can
agree upon a shared secret key for symmetric key encryption of data over an insecure
channel. Sometimes, key exchange

LAN

Local Area Network—a collection of computers located within a small geographic area
(such as an office building) that shares a common communications infrastructure and
network resources (i.e., printers, servers, etc.).

Layer 2 Refer to DLC.

LDAP

Lightweight Directory Access Protocol—a protocol used to access directories on a net-
work, including the Internet. LDAP makes it possible to search compliant directories to
locate information and resources on a network. LDAP is a streamlined version of the
Directory Access Protocol, part of the X.500 standard for network directory services.

LLC

Logical Link Control—one of two sublayers of OSI Layer 2 (refer to

DLC), in which frame

synchronization, flow control and error checking takes place.

MAC

Media Access Control—one of two sublayers of the OSI Model’s DLC, at which data
access and transmission permissions are controlled.

MAC address

Media Access Control address—a unique number that identifies a device, used to prop-
erly direct network traffic to the device.

MaPS™ Refer to Fortress MaPS.

Advertising