Nortel 2300 Series Configuration Manual page 625

Wlan security switch
Hide thumbs Also See for 2300 Series:
Table of Contents

Advertisement

Protected Extensible Authentication Protocol
Protocol Independent Multicast protocol
pseudorandom function
pseudorandom number generator
PSK
Preshared key. The IEEE 802.11 term for a shared secret, also known as a shared key. See shared
secret.
PTK
Pairwise transient key. A value derived from a pairwise master key (PMK) and split into multiple
encryption keys and message integrity code (MIC) keys for use by a client and server as temporal session keys
for IEEE 802.11i robust security. See also 802.11i.
public key
In cryptography, one of a pair of keys, one public and one private, that are created with the
same algorithm for encrypting and decrypting messages and digital signatures. The public key is made
publicly available for encryption and decryption. See also PKI; private key.
Public-Key Cryptography Standards
public-key infrastructure
PVST+
Per-VLAN Spanning Tree protocol. A proprietary Cisco protocol that supports a separate instance
of the Spanning Tree Protocol (STP) for each virtual LAN (VLAN) in a network and maps the multiple
spanning trees to a single tree, to comply with the IEEE 802.1Q specification. See also STP.
QoS
Quality of service. A networking technology that seeks to measure, improve, and guarantee
transmission rates, error rates, and other performance characteristics, based on priorities, policies, and
reservation criteria arranged in advance. Some protocols allow packets or streams to include QoS
requirements.
quality of service
RA
See registration authority (RA).
radio profile
A group of parameters, such as the beacon interval, fragmentation threshold, and security
policies, that you configure in common across a set of radios in one or more Access Point (AP) access ports. A
few parameters, such as the radio name and channel number, must be set separately for each radio.
RADIUS
Remote Authentication Dial-In User Service. A client-server security protocol described in
RFC 2865 and RFC 2866. RADIUS extensions, including RADIUS support for the Extensible Authentication
Protocol (EAP), are described in RFC 2869. Originally developed by Livingston Enterprises, Inc., to
authenticate, authorize, and account for dial-up users, RADIUS has been widely extended to broadband and
enterprise networking. The RADIUS server stores user profiles, which include passwords and authorization
attributes.
RC4
A common encryption algorithm, designed by RSA Data Security, Inc., used by the Wired-Equivalent
Privacy (WEP) protocol and Temporal Key Integrity Protocol (TKIP).
received signal strength indication
See PRF.
See PRNG.
See PKI.
See QoS.
Nortel WLAN Security Switch 2300 Series Configuration Guide
See PEAP.
See PIM.
See PKCS.
See RSSI.
Glossary 625

Advertisement

Table of Contents
loading

Table of Contents