beautypg.com

Fortress Technologies ecure Wireless Access Bridge User Manual

Page 143

background image

133

Fortress : Glossary

RSA SecurID® An authentication method created and owned by RSA Security.

RADIUS

Remote Authentication Dial-In User Service—an authentication server design that
issues challenges to connecting users for their usernames and passwords and authenti-
cates their responses against a database of valid usernames and passwords; described
in RFC 2865.

RF Radio Frequency

RFC

Request for Comments—a document proposing an Internet standard that has been
accepted by the IETF as potentially developing into an established Internet standard.

SCB Refer to

Fortress Secure Client Bridge.

Secure Client Refer to

Fortress Secure Client.

Secure Client Bridge Refer to

Fortress Secure Client Bridge.

Secure Client device

In Fortress Technologies products, a device such as a laptop, PDA, tablet PC, or barcode
scanner, that has the Fortress Secure Client installed and configured to permit the
device to communicate on the Fortress-secured network.

Secure/Security Gateway Refer to

Fortress Security Gateway.

SFP Small Form Pluggable—shorthand for fiber optic Small Form Pluggable transceiver.

SHA Secure Hash Algorithm

SLIP

Serial Line Internet Protocol—a method for communicating over serial lines, developed
for dial-up connections.

SMTP

Simple Mail Transfer Protocol—describes a method for transmitting e-mail between
servers.

SNMP

Simple Network Management Protocol—a set of protocols for simplifying management
of complex networks. The SNMP server sends requests (PDUs) to network devices, and
SNMP-compliant devices (SNMP agents) respond with data about themselves (stored in
MIBs).

SNMP agent

Any network device running the SNMP daemon and storing a MIB, a client of the SNMP
server.

SSH®

Secure Shell®, sometimes, Secure Socket Shell—a protocol, developed by SSH Com-
munication Security®, for providing authenticated and encrypted logon, file transfer
and remote command execution over a network.

state

In Fortress Technologies products, the exact stage of key negotiation between a Secure
Client and the Fortress controller device through which it connects.

SWLAN Secure Wireless Local Area Network

symmetric key encryption

A class of cryptographic algorithm in which a shared secret between two or more par-
ties is used to maintain a private connection between or among them.

TCP

Transmission Control Protocol—defines a method for reliable (i.e., in order, with integ-
rity checking) delivery of data packets over a network, one of the two primary protocols
implemented in TCP/IP networks.

TCP/IP

Transmission Control Protocol/Internet Protocol—the basic, two-part communication
protocol in use on the Internet (refer to IP and TCP).

TLS

Transport Layer Security—a two-part protocol that defines secure data transmission
between client/server applications communicating over the Internet. TLS Record Proto-
col uses data encryption to secure data transfer, and the TLS Handshake Protocol allows
the client and server to authenticate each other and negotiate the encryption method
to use before exchanging data.

Trusted Device

In Fortress Technologies products, a device that does not have the Secure Client
installed but is allowed network access through a policy created for it in MaPS or rules
defined for it on the Fortress controller device.

trusted hierarchy Refer to PKI.