Security Solutions

A-21
Appendix A: Glossary
Steel-Belted
Radius
An implementation of RADIUS developed by Funk Software then later pur-
chased by Juniper Networks. For more information, see Juniper Networks at
http://www.juniper.net.
STP Spanning Tree Protocol. A protocol that eliminates network loops by de-
activating redundant connections. It is currently being revised into RSTP,
which is a faster version of STP. For more information, see IEEE 802.1D at
http://www.ieee802.org/1/pages/802.1D-2003.html.
supplicant The component of 802.1X that requests access to a network. It communicates
with the RADIUS server to submit an end-user’s credentials (and also to authen-
ticate the RADIUS server to the endpoint). An endpoint must have an 802.1X
supplicant to connect to a segment of the network that enforces 802.1X
quarantining. Supplicants supported by the NAC 800 include native suppli-
cants on Windows Vista, XP SP2, and 2000 SP4; MAC OS 10.3; as well as Juniper
Odyssey 4.2 and Open1X Xsupplicant 1.2.8.
symmetric A type of algorithm wherein the same key is used both to encrypt and decrypt.
T
TACACS+ Terminal Access Controller Access Control System Plus. An authentication
protocol that uses TCP. (RADIUS uses UDP.)
Telnet TELephone NETwork. A TCP/IP protocol that provides a fairly general, bi-
directional, 8-bit, byte-oriented communications facility. It is typically used to
provide user-oriented command-line login sessions between hosts on the
Internet. The name “Telnet” came about because the protocol was designed
to emulate a single terminal attached to the other computer. For more infor-
mation, see RFC 854 at http://www.ietf.org/rfc/rfc0854.txt.
temporary access
period
The time during which an endpoint is allowed access to the network, overriding
the endpoint’s quarantine status. The network administrator configures the
length of this period.
testing methods Methods that the NAC 800 uses to perform tests. The NAC 800 supports three
testing methods: NAC agent test method, ActiveX test method, and agentless test
method.
TKIP Temporal Key Integrity Protocol. A link-layer security protocol that is used
in WPA to correct deficiencies in WEP. For more information, see http://
standards.ieee.org/getieee802/download/802.11i-2004.pdf.