Extreme Networks Summit WM20 User Manual page 220

Version 4.2
Hide thumbs Also See for Summit WM20:
Table of Contents

Advertisement

Glossary
D (Continued)
DTIM
Dynamic WEP
E
EAP-TLS
EAP-TTLS
ELA (OPSEC)
Encapsulation
ESS
220
DTIM delivery traffic indication message (in 802.11 standard)
The IEEE introduced the concept of user-based authentication using
per-user encryption keys to solve the scalability issues that
surrounded static WEP. This resulted in the 802.1X standard, which
makes use of the IETF's Extensible Authentication Protocol (EAP),
which was originally designed for user authentication in dial-up
networks. The 802.1X standard supplemented the EAP protocol with a
mechanism to send an encryption key to a Wireless AP. These
encryption keys are used as dynamic WEP keys, allowing traffic to
each individual user to be encrypted using a separate key.
EAP-TLS Extensible Authentication Protocol - Transport Layer
Security. A general protocol for authentication that also supports
multiple authentication methods, such as token cards, Kerberos, one-
time passwords, certificates, public key authentication and smart
cards. IEEE 802.1x specifies how EAP should be encapsulated in LAN
frames.
In wireless communications using EAP, a user requests connection to
a WLAN through an access point, which then requests the identity of
the user and transmits that identity to an authentication server such as
RADIUS. The server asks the access point for proof of identity, which
the access point gets from the user and then sends back to the server
to complete the authentication.
EAP-TLS provides for certificate-based and mutual authentication of
the client and the network. It relies on client-side and server-side
certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP keys.
EAP-TTLS (Tunneled Transport Layer Security) is an extension of
EAP-TLS to provide certificate-based, mutual authentication of the
client and network through an encrypted tunnel, as well as to generate
dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
(See also PEAP)
Event Logging API (Application Program Interface) for OPSEC, a
module in Check Point used to enable third-party applications to log
events into the Check Point VPN-1/FireWall-1 management system.
See tunnelling.
Extended Service Set (ESS). Several Basic Service Sets (BSSs) can be
joined together to form one logical WLAN segment, referred to as an
extended service set (ESS). The SSID is used to identify the ESS. (See
BSS and SSID.)
Summit WM20 User Guide, Software Release 4.2

Advertisement

Table of Contents
loading

Table of Contents