beautypg.com

HP Compaq t5720 Thin Client User Manual

Page 64

background image

HP Sygate Security Agent User Guide

DLL fingerprint: A 128-bit number that is generated by performing an MD5 hash of an

entire DLL packet. It is unique for each DLL. The MD5 hash or fingerprint of each
DLL is stored on the Sygate Security Agent and forwarded to the Sygate
Management Server. If the DLL is changed in any way, the DLL fingerprint changes.
See also DLL, DLL authentication, MD5 hash.

domain: A group of computers that are part of a network and share a common directory

database. Each domain has a unique name and is organized in levels that are
administered as a unit using common rules.

domain name: The name by which a group of computers is known to the network. Most

organizations have a unique name on the Internet that allows individuals, groups,
and other organizations to communicate with them. See also domain.

DoS attack: See Denial of Service (DoS).

driver-level protection: A Sygate software feature that blocks protocol drivers from gaining

access to the network unless a user gives permission. If a protocol driver attempts to
gain access to the network through a client running the Sygate Security Agent,
depending on the rule set, the protocol driver is allowed, blocked, or a pop-up
message displays. See also protocol driver blocking.

Dynamic Host Configuration Protocol (DHCP): A TCP/IP protocol that provides

dynamic configuration of host IP addresses and enables individual computers on an
IP network to extract configuration parameters from a DHCP server. DHCP lets a
system administrator supervise and distribute IP addresses from a central point in
the network.

E

EAP: Extensible Authentication Protocol. Sits inside of PPP’s authentication protocol and

provides a generalized framework for several different authentication methods. EAP
is used to pass the authentication information between the supplicant (the wireless
workstation) and the authentication server. The actual authentication is defined and
handled by the EAP type. The access point acting as authenticator is only a proxy to
allow the supplicant and the authentication server to communicate.

encryption: The use of an algorithm to convert typically sensitive data into a form that is

unreadable except by authorized users. See also Communications Channel
Encryption.

endpoint: Any network device that connects to the enterprise network and runs network-

based applications. Network devices can include laptops, desktop computers,
servers, and PDAs. See also access point.

54

This manual is related to the following products: