beautypg.com

HP Compaq t5720 Thin Client User Manual

Page 67

background image

Glossary

Intrusion Prevention System (IPS): A device or software used to prevent intruders from

accessing systems from malicious or suspicious activity. This is contrast to an
Intrusion Detection System (IDS), which merely detects and notifies. Sygate Security
Agent is both an IDS and an IPS product since the Agent includes both an IDS and
firewall functionality making it capable of not only detecting but also blocking an
attack. See also Intrusion Detection System (IDS).

IP address: A 32-bit address used to identify a node on a network. Each node on the

network must be assigned a unique address in dotted decimal notation, such as
125.132.42.7. See also local IP address, remote IP address.

IP fragmentation: A packet that has been split into two or more packets. The Sygate

Security Agent supports IP fragmentation, the ability to receive or send incomplete
packets over the network. See also packets, Fragmented Packets.

IP spoofing: IP spoofing is a process where an intruder uses an IP address of another

computer to acquire information or gain access. Because the intruder appears to be
someone else, if a reply is sent, it goes to the spoofed address, not the intruder’s
address. See also Anti-IP Spoofing.

IPS: See Intrusion Prevention System (IPS).

L

LDAP: See Lightweight Directory Access Protocol (LDAP).

library: See signature library, System Library, custom library.

Lightweight Directory Access Protocol (LDAP): A standard directory access protocol

for searching and updating information directories containing, for example, email
addresses, phone numbers, and computer names and addresses. LDAP is the
primary protocol used to access directory servers such as Active Directory. See also
Active Directory, directory server.

local IP address: From the perspective of the Agent, the IP address of the computer the

user is working on. See also IP address.

local port: From the perspective of the Sygate Security Agent, the port on the computer

being used for this connection. See also port.

Location: A set of rules and regulations called a security policy that the Sygate Management

Server sends to each Sygate Security Agent whenever the Agent sends a request to
the Management Server. Location is defined by the network settings of the computer
where the request was initiated. See also network settings.

57

This manual is related to the following products: