Netgear NMS200 – ProSafe Network Management System ユーザーズマニュアル
185
A
A.
Glossary
Access Control
Refers to mechanisms and policies that restrict access to computer resources. An
access control list (ACL), for example, specifies what operations different users can
perform on specific files and directories.
access control list (ACL), for example, specifies what operations different users can
perform on specific files and directories.
Alarm
A signal alerting the user to an error or fault. Alarms are produced by events. Alarms
produce a message within the Alarm Window.
produce a message within the Alarm Window.
API
Application Programing Interface — A set of routines used by the application to direct
the performance of procedures by the computer’s operating system.
the performance of procedures by the computer’s operating system.
Authentication
The process of determining the identity of a user that is attempting to access a
network. Authentication occurs through challenge/response, time-based code
sequences or other techniques. See CHAP and PAP.
network. Authentication occurs through challenge/response, time-based code
sequences or other techniques. See CHAP and PAP.
Authorization
The process of determining what types of activities or access are permitted on a
network. Usually used in the context of authentication: once you have authenticated a
user, they may be authorized to have access to a specific service.
network. Usually used in the context of authentication: once you have authenticated a
user, they may be authorized to have access to a specific service.
CoS
Class of Service — Describes the level of service provided to a user. Also provides a
way of managing traffic in a network by grouping similar types of traffic.
way of managing traffic in a network by grouping similar types of traffic.
Database
An organized collection of Oware objects.
Deployment
The distribution of solution blades throughout the domain.
Digital Certificate
A digital certificate is an electronic “credit card” that establishes your credentials when
doing business or other transactions on the Web. It is issued by a certification
authority (CA). It contains your name, a serial number, expiration dates, a copy of the
certificate holder's public key (used for encrypting and decrypting messages and
digital signatures), and the digital signature of the certificate-issuing authority so that a
recipient can verify that the certificate is real.
doing business or other transactions on the Web. It is issued by a certification
authority (CA). It contains your name, a serial number, expiration dates, a copy of the
certificate holder's public key (used for encrypting and decrypting messages and
digital signatures), and the digital signature of the certificate-issuing authority so that a
recipient can verify that the certificate is real.
Domain
A goal-oriented environment that can include an industry, company, or department.
You can use Oware to create solutions within your particular domain.
You can use Oware to create solutions within your particular domain.
Encryption
Scrambling data in such a way that it can only be unscrambled through the application
of the correct cryptographic key.
of the correct cryptographic key.
Equipment
A network device managed by the system.