9.7. Glossary

In the following table, you will find definitions for keywords that are essential for a clearer understanding of the OpenNAC Enterprise documentation.

You can also consult the Basic Concepts section for a more comprehensive overview of some terms listed in this glossary.

Term

Definition

2FA

Two-factor authentication, sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves.

802.1x

Is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to connect to a LAN or WLAN.

Active Directory

Is the Microsoft commercial name provided to Directory services, Active directory contains all the domain assets such as user, printers, groups, etc.

Administration Portal

The main administration tool to be used by any Network or Security Engineer. You can carry out Administration, Operation, troubleshooting and monitoring for OpenNAC Technologies.

Allin1

The Allin1 is based on Intel® NUC, a small form factor PC with a tiny footprint. In this server, we deploy the ON Sensor, played by the physical hardware, and the ON Analytics and ON Core Principal hosted by virtual machines.

Apache HTTP Server

Is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0.

API

Is the acronym for Application Programming Interface, which is a software intermediary that allows two applications to talk to each other.

Business Profiles

OpenNAC has an event classification method, a business profile includes one or many policies. This type of groups can be used to filter and create specific reports and queries.

BYOD

Bring your own device, is a policy that allows employees in an organization to use their personally owned devices for work-related activities.

CA

Certification authority, is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party—trusted.

Captive Portal

It is a user portal that allows user device registration, Guest access, and OpenNAC Agent download.

Cluster

A cluster is a collection of connected nodes identified by its cluster name. Each node in a cluster knows about the other nodes. Each node can accept a client request and forward that to the appropriate node.

CMDB

CMDB stands for Configuration Management Database and it contains all relevant information about all the different components used and managed by OpenNAC Enterprise.

CoA

RADIUS Change of Authorization is a method used to change authorization status in a realm time and during a current session.

Configuration Vars

OpenNAC module where you include default parameters to be used.

Configuration Wizards

OpenNAC Technologies includes configuration wizards that provide a key benefit regarding Network access control technologies, this allows to Generate certificates, create a initial configuration and also Join to Active Directory among others.

DHCP Server

Is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients.

Dictionary/Brute-Force Attacks

Techniques where attackers systematically try all possible combinations of passwords or phrases to gain unauthorized access.

Digital Certificates

Is a file or electronic password that proves the authenticity of a device, server, or user through the use of cryptography and the public key infrastructure (PKI).

DNS Server

Domain Name System, is the hierarchical and decentralized naming system used to identify computers reachable through the Internet or other Internet Protocol (IP) networks.

DoS

Denial of Service (DoS) is an attack that aims to disrupt the normal functioning of a network or system, making it temporarily or indefinitely unavailable.

EAP

EAP (Extensible Authentication Protocol) is a framework for network communication that provides various methods for authentication, often used in wireless networks and Point-to-Point Protocol (PPP) connections. EAP allows for flexible and extensible authentication mechanisms, enhancing network security by supporting various authentication methods, including passwords, digital certificates, and token-based systems.

EDR

Endpoint Detection and Response (EDR) is a cybersecurity solution that focuses on detecting and responding to malicious activities on endpoints.

Elasticsearch

Is a search engine based on the Lucene library. It provides a distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents.

ELK stack

ELK (Elasticsearch, Logstash, Kibana): A data analysis and visualization stack, where Elasticsearch stores and retrieves data, Logstash processes and forwards it, and Kibana provides a user-friendly interface for querying and visualizing data.

Farm

A “farm” refers to a group of interconnected servers that work together to provide High Availability.

FreeRadius

Is a modular, high performance free RADIUS suite developed and distributed under the GNU General Public License, version 2, and is free for download and use. The FreeRADIUS Suite includes a RADIUS server, a BSD-licensed RADIUS client library, a PAM library, an Apache module, and numerous additional RADIUS related utilities and development libraries.

High Availability (HA)

High Availability (HA) is a design approach for ensuring uninterrupted operation of vital systems and services. It utilizes technologies to prevent downtime caused by hardware or software failures. The goal is to maintain service reliability and minimize interruptions in critical operations.

IoT

The Internet of things describes physical objects (or groups of such objects) with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.

IP Address

Internet Protocol Address is a numerical label assigned to each device in a computer network that uses the Internet Protocol for communication. It serves as an identifier for the device’s location and allows data to be routed to and from it on the internet or a local network.

Kibana

Is a source-available data visualization dashboard software for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data.

Lateral Movement

Technique used by attackers to move from one compromised system to another within a network, aiming to explore and compromise additional targets.

Layer2

Is referred to the Layer 2 of OSI Model. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.

Layer3

Is referred to the Layer 3 of OSI Model. The network layer is responsible for packet forwarding including routing through intermediate routers, since it knows the address of neighboring network nodes, and it also manages quality of service (QoS), and recognizes and forwards local host domain messages to the Transport layer (layer 4).

Layer4

Is referred to the Layer 4 of OSI Model. The transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI). It provides services such as connection-oriented data stream support, reliability, flow control, and multiplexing.

LDAP

LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and managing directory information services, such as user data and resources, in a network. It provides a lightweight and efficient way to search, retrieve, and modify directory data. LDAP is commonly used for user authentication, authorization, and directory services in network environments.

Load Balancer

A Load Balancer is a software component that evenly distributes incoming network traffic across multiple servers or resources to optimize performance, enhance availability, and prevent overloading of any single server.

Logstash

Is a tool for managing events and logs. When used generically, the term encompasses a larger system of log collection, processing, storage and searching activities.

MAB

MAC Address Bypass (MAB) is an access control technique that allows port-based access control by using an endpoint’s MAC address. An interface with MAB authentication configured can be dynamically enabled or disabled based on the connected endpoint’s MAC address.

MAC Address

MAC Address (Media Access Control Address) is a unique identifier assigned to a network interface on a device, such as a computer or network card, to facilitate communication on a local network.

Malware

Is an intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.

MemCache

It is an open source, distributed memory object caching system that alleviates database load to speed up dynamic Web applications.

MFA

Multi-factor Authentication is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. Rather than just asking for a username and password, MFA requires one or more additional verification factors, which decreases the likelihood of a successful cyber attack.

MySQL

Is a relational database management system (RDBMS) developed by Oracle that is based on structured query language (SQL).

NAC

Network access control is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

NGFW

Is a network security device that provides capabilities beyond a traditional, stateful firewall. While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.

NIDS

Network Intrusion Detection System (NIDS) is a security tool that monitors network traffic for suspicious activity or potential security threats.

NMAP

Is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping.

Node

A node refers to an individual computing device within a network or system. It can be a standalone server, computer, or device that is part of a larger network or infrastructure.

ON Agent

Is used to provide security analysis, Hardware and software inventory and VPN Client.

ON Analytics

Is one Role in openNAC technologies, this provides an Analysis Engine and reporting capabilities. Stores all the events in different index which are searchable and easily filtered.

ON Captive

It is used to configure the Captive Portal workflows and themes.

ON Core

Is the main role in openNAC technologies, this provides, for instance, AAA Services and many others.

ON NAC

OpenNAC module that includes Policy Engine and Business Profiles.

ON Netconf/ON Backup

OpenNAC module that includes Network management tools such as macros, cron, and devices backups.

ON Sensor

Is an OpenNAC technology role. This can be deployed in-bound or out-of-bound, this collects and decodes network protocols and sends it to ON Analytics. This is based on Zeek IDS/IPS technologies.

ON VPNGW

The OpenNAC VPNGW allows establishing the VPN from a remote location to a corporate network. It also allows applying segmentation access policies, depending on the user profile.

OSI Model

A conceptual framework that defines seven layers to standardize and understand network communication functions, from the physical transmission of data to the end-user application interfaces.

OSQuery

OSQuery is an operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. It uses basic SQL commands to leverage a relational data-model to describe a device.

OTP

One-time password systems provide a mechanism for logging on to a network or service using a unique password that can only be used once, as the name suggests.

OVA

Is an Open Source format to distribute and deploy Virtual Machines.

P12 file

A P12 file contains a digital certificate that uses PKCS#12 (Public Key Cryptography Standard #12) encryption. It is used as a portable format for transferring personal private keys and other sensitive information.

Pass-the-Hash

A hacking technique where an attacker captures the hashed credentials of a user and uses them to authenticate and gain unauthorized access.

PEAP

The Protected Extensible Authentication Protocol(PEAP), also known as Protected EAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.

PEM file

Privacy Enhanced Mail is a Base64 encoded DER certificate. PEM certificates are frequently used for web servers as they can easily be translated into readable data using a simple text editor. Generally when a PEM encoded file is opened in a text editor, it contains very distinct headers and footers.

Plugins

Is an application that, in a computer program, adds additional functionality or a new feature to the software. Plugins are designed to be easily integrated into the host application, allowing users to enhance or modify its capabilities without altering the core code.

Policy Engine

Is one of the main modules of the ON Core where authentication, authorization and accounting happens. Additional capabilities like tagging, registering and plugin calls are also included.

Proxy

Proxy is an intermediary server or device that acts as a go-between for user requests to access web content or services. It helps enhance security, privacy, and performance by masking the user’s IP address and handling requests on their behalf.

PSK

Phase Shift Keying (PSK) is a digital data modulation system in which binary data signals switch the phase of a radio frequency carrier.

Quarantine VLAN

Is a VLAN where the users are sent by Policy or by Administrator instructions, this is a secure environment where the User devices can be isolated and managed properly without risk. Normally any device that is not compliance in terms of security is sent to this.

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. RADIUS was developed by Livingston Enterprises in 1991 as an access server authentication and accounting protocol.

RDP

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection.

Reconnaissance

The phase of a cyber-attack where the attacker gathers information about a target, such as network topology, vulnerabilities, and security measures.

Registry VLAN

Is a VLAN where the users register their devices in ON Core CMDB.

Service VLAN

Is a VLAN where the users are sent when authentication happens properly or when Security policy decides, this provides access to the corporate network and only the set the resources defined by the policy.

SIEM

Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources.

Single Sign-On (SSO)

A system that allows users to log in once and gain access to multiple resources or applications without the need for multiple logins.

Smart Card

Chip card, or integrated circuit card (ICC or IC card) is a physical electronic authorization device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip.

SMB

Server Message Block (SMB) is a network protocol that provides shared access to files, printers, and other communication between nodes on a network.

SNMP

SNMP (Simple Network Management Protocol) is a protocol used to monitor and manage network-connected devices, allowing administrators to collect information and control network components.

SNMP Traps

Asynchronous notifications sent by network devices such as Switches, AP, VPNs, or others to notify changes to OpenNAC.

SSID

A Service Set Identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN). An SSID is sometimes referred to as a “network name”. This name allows stations to connect to the desired network when multiple independent networks operate in the same physical area.

TCP

Transmission Control Protocol (TCP), is a communication standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

TTL

TTL (Time to Live) is a value in network packets that determines how long the packet remains valid or how many hops it can traverse in a network before being discarded.

UDP

User Datagram Protocol (UDP) is a communication protocol that facilitates the exchange of messages between computing devices in a network. It’s an alternative to the transmission control protocol (TCP). In a network that uses the Internet Protocol (IP), it is sometimes referred to as UDP/IP.

UDS

User Data source (UDS) is the name used by OpenNAC to provide identity repositories.

VLAN

Virtual Local Area Network (VLAN) is a logical subgroup within a local area network that is created through software rather than by manually moving cables in the wiring closet. It combines user stations and network devices into a single unit regardless of the physical LAN segment they are attached to. It also lets traffic flow more efficiently within populations of mutual interest.

VM

Virtual Machine (VM) is a software-based emulation of a physical computer that allows multiple operating systems to run on a single physical machine, enabling efficient resource utilization and isolation.

VPN

Virtual Private Network (VPN) is a technology that extends a private network across a public network. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Wired AutoConfig

Wired AutoConfig Service is a system service that provisions local area network (LAN) Ethernet adapters with the security and connectivity settings that are required for Institute of Electrical and Electronics Engineers (IEEE) 802.1X authenticated IEEE 802.3 wired access.

Wireguard

WireGuard is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances.

WMI

Windows Management Instrumentation (WMI) is the infrastructure for management data and operations on Windows-based operating systems. You can write WMI scripts or applications to automate administrative tasks on remote computers, but WMI also supplies management data to other parts of the operating system and products.

XDR

Extended Detection and Response (XDR) is an evolution of EDR that integrates and correlates data from multiple security components to provide a broader threat detection and response capability.

Zeek

Formerly BRO, is a free and open-source software network analysis framework. It can be used as a network intrusion detection system (NIDS) but with additional live analysis of network events. It is released under the BSD license.

Zero Trust

Zero Trust is a security model that assumes no trust and enforces strict access controls for all devices and users, even if they are inside the network.