Security Solutions

A-15
Appendix A: Glossary
NAT-T NAT-Traversal. An IKE method for UDP encapsulation of ESP packets so that
they pass better through firewalls. For more information, see RFC 3947 at
http://tools.ietf.org/html/rfc3947 and RFC 3948 at http://tools.ietf.org/html/
rfc3948.
network access
control
A security implementation that attempts to control access to a network by
enforcing security policies, restricting prohibited traffic types, identifying and
containing end-users that break rules or are noncompliant with policies, and
stopping and mitigating security threats.
network access
controller
See NAC.
network access
server
See NAS.
NIC Network Interface Card. A printed circuit board that includes a cable jack or
an antenna that gives a computing device access to a network. Every NIC has
an address (MAC address) that is unique to that card.
NIS Network Information Service. A Sun Microsystems client-server directory
service protocol to communicate information such as host and client names
throughout a network. This protocol is used on UNIX networks.
O
OpenLDAP A free, open-source version of LDAP that is platform-independent. For more
information, see the official Web site at http://www.openldap.org.
OTP One-Time Password. A type of password that is used one time only. The
password is usually generated according to a preset function (such as time of
day) that only the password generator and authenticator know.
P
P2P Peer-to-Peer. A P2P network is comprised of peer nodes rather than clients
and servers. P2P software allows end-users to connect directly to other end-
users and is used for file sharing. Many P2P software packages are considered
spyware, and their use can be discouraged or even prohibited by corporate
policies.