Security Solutions
A-11
Appendix A: Glossary
H
hash A number generated by running a string of text through an algorithm. The hash
is substantially smaller than the text itself and is unique, because algorithms
transform data in such a way that it is extremely unlikely that some other text
will produce the same hash value. The hash is also irreversible: the encryption
cannot be reversed to obtain the original text.
HMAC keyed-Hash MAC. A type of MAC that is calculated with a hash function and
a secret key. It can be used to verify both data integrity and authenticity. For
more information, see RFCs 2104 and 2202 at http://tools.ietf.org/html.
I
IANA Internet Assigned Numbers Authority. An organization whose purpose is to
assign IP addresses, manage DNS root zones, and make other IP assignments.
IAS Internet Authentication Services. The Microsoft implementation of RADIUS.
IDM Identity Driven Manager. A ProCurve Networking application that provides
management of user-based profiles (including ACLs, QoS settings, and rate
limits). IDM assigns various profiles to end-users based on their identity
(community), access time, access location, and endpoint integrity posture.
IE Microsoft’s Internet Explorer browser.
IGMP Internet Group Management Protocol. A protocol that is used to manage IP
multicast groups. It is often used for online video and gaming.
IKE Internet Key Exchange. A protocol that is used to set up a security association
in the IPsec protocol suite.
IMSI International Mobile Subscriber Identity. A unique number that is stored in
a SIM and is used by GSM and UMTS mobile telephones. The number helps
locate the phone and acquire other information.
inline deployment
method
The NAC 800 is placed between a “choke point” and the rest of the network
such that all traffic to be quarantined passes through the NAC 800. See also
inline quarantine method.
inline quarantine
method
A quarantine method that relies on the NAC 800’s placement in the network.
The NAC 800 functions as a Layer 2 bridge that imposes a firewall between its
Ethernet port 1 and port 2. Only traffic from endpoints whose integrity posture is
“Healthy” or “Check-Up” can pass through the NAC 800.