User guide
Odyssey Access Client User Guide
112
Firewall—A hardware device or software application designed to filter incoming or
outgoing traffic based on predefined rules and patterns. Firewalls can filter traffic
based on protocol uses, source or destination address, and port addresses and can
even apply state-based rules to block unwanted activities or transactions.
G
Granularity—The relative fineness to which an access control mechanism can be
adjusted.
H
Hash value—The resultant output of data generated from an encryption hash when
applied to a specific set of data. If computed and passed as part of an incoming
message and then recomputed upon message receipt, a hash value can be used to
verify the authenticity of the received data if the two hash values match.
Hashing—A methodology used to calculate a short, secret value from a data set of
any size (usually for an entire message or for individual transmission units). This
secret value is recalculated independently on the receiving end and compared to
the submitted value to verify the sender’s identity.
Host Checker—A software component of OAC that checks your computer for
compliance to the security policies that your Infranet Controller administrator
specifies. Examples of compliance might be that you have the correct antivirus
software version and security setting or that you have the latest operating system
patch level installed.
Host Enforcer—A software component of OAC that protects your computer from
attacks from other computers by allowing only the incoming and outgoing traffic
that your Infranet Controller administrator specifies for your assigned role. (A role
defines settings for your user account, such as which resources you can access).
Hotspot—A wireless access zone, could be used for public or private network
access.
HTML—Hypertext Markup Language.
HTTP—Hypertext Transfer Protocol. Used by WWW servers and clients to exchange
hypertext data.
I
IEEE—Abbreviation for the Institute of Electrical and Electronics Engineers.
Infranet Controller—A server that verifies your identity and your computer’s
compliance with security requirements before allowing you to access protected
resources.
Infranet Enforcer—A Juniper Networks security device that operates with the
Infranet Controller to enforce security policies. The Infranet Enforcer is deployed in
front of the servers and protected resources.