User guide

111
Glossary
Encryption hash—A method in which a selection of data is mixed into a section
data based on an algorithm. The result is called a hashed value.
Encryption keys—A sequence of characters that an encryption algorithm uses to
make plain text unreadable unless you share the same encryption key needed to
decode the encrypted message.
Extensible Authentication Protocol (EAP)—An IETF standard that provides for
mutual authentication between a client and a AAA authentication server.
EAP-JUAC—JUAC is an EAP authentication protocol specific to Juniper Unified
Access Control networks and is required when connecting to a Juniper Infranet
Controller.
EAP-LEAP—Cisco Wireless. With LEAP, mutual authentication relies on a shared
secret and the user's logon password, which is known by the client and the
network.
EAP-TLSUses digital certificates for both user and server authentication and
supports the three key elements of 802.1X/EAP.
EAP-TTLS Tunneled Transport Layer Security extends the authentication
negotiation by using the secure connection established by the TLS handshake to
exchange additional information between client and server.
EAP-PEAP—Uses a digital certificate for server authentication. For user
authentication, PEAP supports various EAP-encapsulated methods within a
protected TLS tunnel. PEAP supports the three main elements of 802.1X/EAP.
Endpoint—An endpoint refers to the computer (desktop, laptop, or other mobile
wireless computing device) that you use to access resources on a network.
Extensible Markup Language (XML)—Like HTML, this flexible markup language is
based on standards from the World Wide Webb Consortium. XML can be used to
generate standard or fully customized content rich Web pages, documents, and
applications.
Extranet—A special internetwork architecture wherein a company’s or
organization’s external partners and customers are granted access to some parts of
its intranet and the services it provides in a secure, controlled fashion.
F
False negative—False negative acknowledgements of intrusion in an intrusion
detection system, which means an intrusion has occurred but the IDS discarded
relative events or traces as false signals.
False positive—False affirmative acknowledgment of intrusion, which means
intrusion detection has incorrectly identified certain events or traces as signaling an
attack or intrusion when no such attack or intrusion is underway. Thus a false
positive is a false alarm.
FIPS—Federal Information Processing Standards. Created for the evaluation of
cryptographic modules.