Nortel 2300 Series Configuration Manual page 628

Wlan security switch
Hide thumbs Also See for 2300 Series:
Table of Contents

Advertisement

628 Glossary
subnet mobility
and WLAN—Security Switch (WSS) switches in a virtual LAN (VLAN) while maintaining a single IP
address and associated data sessions.
supplicant
syslog server
Software) supports up to four syslog servers on virtual LANs (VLANs) whose locations are configurable.
WSS Software log protocol complies with RFC 3164.
TAPA™
Nortel access point Access™ protocol. A point-to-point datagram protocol, developed by Nortel ,
that defines the way each Access Point (AP) access point communicates with a WLAN—Security Switch
(WSS) switch in a Nortel WLAN 2300 System. By means of TAPA, AP access ports announce their presence
to the WSS, accept configuration from it, relay traffic to and from it, announce the arrival and departure of
users (clients), and provide statistics to the WSS on command.
Temporal Key Integrity Protocol
TKIP
Temporal Key Integrity Protocol. A wireless encryption protocol that fixes the known problems in the
Wired-Equivalent Privacy (WEP) protocol for existing IEEE 802.11 products. Like WEP, TKIP uses RC4
ciphering, but adds functions such as a 128-bit encryption key, a 48-bit initialization vector, a new message
integrity code (MIC), and initialization vector (IV) sequencing rules to provide better protection. See also
802.11i; CCMP.
TLS
Transport Layer Security protocol. An authentication and encryption protocol that is the successor to
the Secure Sockets Layer (SSL) protocol for private transmission over the Internet. Defined in RFC 2246, TLS
provides mutual authentication with nonrepudiation, encryption, algorithm negotiation, secure key derivation,
and message integrity checking. TLS has been adapted for use in wireless LANs (WLANs) and is used widely
in IEEE 802.1X authentication. See also EAP-TLS; PEAP; TTLS.
TLV
Type, length, and value. A methodology for coding parameters within a frame. Type indicates a
parameter's type, length indicates the length of its value, and value indicates the parameter's value.
Transport Layer Security protocol
TTLS
Tunneled Transport Layer Security. An Extensible Authentication Protocol (EAP) method developed
by Funk Software, Inc., and Certicom for 802.1X authentication. TTLS uses a combination of certificates and
password challenge and response for authentication. The entire EAP subprotocol exchange of attribute-value
pairs takes place inside an encrypted transport layer security (TLS) tunnel. TTLS supports authentication
methods defined by EAP, as well as the older Challenge Handshake Authentication Protocol (CHAP),
Password Authentication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2. Compare
EAP-TLS; PEAP.
Nortel access point Access protocol
Tunneled Transport Layer Security subprotocol
tunneling
The transmission of data by one network through the connections of another network by
encapsulating its data and protocol information within the other network's transmission units. To forward
traffic for a roaming user within a Mobility Domain™ group, a WLAN—Security Switch (WSS) switch that is
not a member of the user's virtual LAN (VLAN) creates a tunnel to another WSS switch on which the user's
VLAN is configured.
320657-A
The ability of a wireless user (client) to roam across Access Point (AP) access ports
A client that is attempting to access a network.
A remote repository for log messages. Nortel WLAN 2300 System Software (WSS
See TKIP.
See TLS.
See TAPA™.
See TTLS.

Advertisement

Table of Contents
loading

Table of Contents