3Com WX1200 3CRWX120695A Configuration Manual page 679

Wireless lan mobility system wireless lan switch and controller
Hide thumbs Also See for WX1200 3CRWX120695A:
Table of Contents

Advertisement

DES
DHCP
dictionary attack
Diffie-Hellman
Diffserv
digital certificate
digital signature
Digital Signature
Algorithm
direct-sequence
spread-spectrum
domain
Data Encryption Standard. A federally approved symmetric encryption
algorithm in use for many years and replaced by the Advanced
Encryption Standard (AES). See also 3DES.
Dynamic Host Configuration Protocol. A protocol that dynamically
assigns IP addresses to stations, from a centralized server. DHCP is the
successor to the Bootstrap Protocol (BOOTP).
An attempt to gain illegal access to a computer or network by logging
in repeatedly with passwords that are based on a list of terms in a
dictionary.
A key exchange algorithm that was the first public-key algorithm ever
published. Diffie-Hellman can be used anonymously (without
authentication). Anonymous Diffie-Hellman is used to establish the
connection between the 3Com Wireless Switch Manager (3WXM) and
a Wireless Switch (WX).
Differentiated services. An architecture for providing different types or
levels of service for network traffic. Diffserv aggregates flows in the
network so that routers and switches need to distinguish only a
relatively small number of aggregated flows, even if those flows contain
thousands or millions of individual flows.
A document containing the name of a user (client) or server, a digital
signature, a public key, and other elements used in authentication and
encryption. See also X.509.
The result of encrypting a hash of a message or document with a
private key. A digital signature is used to verify the authenticity of the
sender and the integrity (unaltered condition) of the message or
document. See also hash.
See DSA.
See DSSS.
(1) On the Internet, a set of network addresses that are organized in
levels. (2) In Microsoft Windows NT and Windows 2000, a set of
network resources (applications, printers, and so forth) for a group of
users (clients). Clients log into the domain to access the resources,
which can be located on a number of different servers in the network.
G
679
LOSSARY

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents