Security Solutions

A-13
Appendix A: Glossary
lightweight
directory access
protocol
See LDAP.
load balancing Distribution of integrity checking among two or more devices. The NAC 800
distributes the testing of endpoints across all ESs in a cluster. The NAC 800
uses a hashing algorithm based on MAC or IP addresses to distribute the
endpoints between the ESs.
M
MAC-Auth MAC Authentication. Authentication that is based on the endpoint’s MAC
address rather than on the user’s credentials. MAC-Auth does not require
device configuration or end-user interaction; instead, the authenticator han-
dles sending the MAC address to the authentication server to be checked
against black lists and white lists.
malware Software designed to infiltrate or damage a computer system. The term
encompasses computer viruses, worms, Trojans, spyware, and adware. In law,
malware is sometimes known as a computer contaminant. Malware is not
defective software that has a legitimate purpose but contains errors or bugs.
managed endpoint A network device that is forced to comply with the companys security policies
and is under administrative control.
management
server
See MS.
MD5 Message-Digest algorithm 5. A hash algorithm used to create digital signa-
tures. MD5 is a one-way hash function that transforms and condenses data
into a fixed string of digits called a message digest. A variety of protocols use
MD5 to check a message’s data integrity as well as authenticate the sender.
Some protocols, such as EAP-MD5, require passwords to be transmitted as
hashes rather than in plaintext. For more information, see RFC 1321 at http:/
/tools.ietf.org/html/rfc1321.
MIB Management Information Base. A set of network objects that can be managed
with SNMP. For more information, see RFC 3418 at http://www.ietf.org/rfc/
rfc3418.txt.
mirroring, remote See remote mirroring.
MPPE Microsoft Point-to-Point Encryption. A protocol for encrypting data across
PPP and VPN connections, which uses the RSA RC4 encryption algorithm. For
more information, see RFCs 3078 at http://tools.ietf.org/html/rfc3078.