Appendix A
A.1 Glossary of Terms
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
741
MAC Authentication Bypass. Endpoints such as network printers, Ethernet-
based sensors, cameras, and wireless phones do not support 802.1X au-
thentication. For such endpoints, MAC Authentication Bypass mechanism is
used. In this method, the MAC address of the endpoint is used to authenti-
Media Access Control. A MAC address is a unique identifier assigned to net-
work interfaces for communications on a network.
Mobile Application Management. MAM refers to software and services used
to secure, manage, and distribute mobile applications used in enterprise set-
tings on mobile devices like smartphones and tablet computers. Mobile Ap-
plication Management can apply to company-owned mobile devices as well
Modulation and Coding Scheme. MCS is used as a parameter to determine
the data rate of a wireless connection for high throughput.
Message Digest 4. MD4 is an earlier version of MD5 and is an algorithm
used to verify data integrity through the creation of a 128-bit message digest
Message Digest 5. The MD5 algorithm is a widely used hash function pro-
ducing a 128-bit hash value from the data input.
Microsoft Data Access Components. MDAC is a framework of interrelated
Microsoft technologies that provides a standard database for Windows OS.
Mobile Device Management. MDM is an administrative software to manage,
monitor, and secure mobile devices of the employees in a network.
Multicast Domain Name System. mDNS provides the ability to perform DNS-
like operations on the local link in the absence of any conventional unicast
DNS server. The mDNS protocol uses IP multicast User Datagram Protocol
(UDP) packets, and is implemented by the Apple Bonjour and Linux NSS-
mDNS services. mDNS works in conjunction with DNS Service Discovery
(DNS-SD), a companion zero-configuration technique specified. See RFC
Multi-
factor Authentication. MFA lets you require multiple factors, or proofs of
identity, when authenticating a user. Policy configurations define how often
multi-factor authentication will be required, or conditions that will trigger it.
Management Information Base. A hierarchical database used by SNMP to
manage the devices being monitored.
Electromagnetic energy with a frequency higher than 1 GHz, corresponding
to wavelength shorter than 30 centimeters.
Multiple Input Multiple Output. An antenna technology for wireless communi-
cations in which multiple antennas are used at both source (transmitter) and
destination (receiver). The antennas at each end of the communications cir-
cuit are combined to minimize errors and optimize data speed.