Siemens HiPath C10 User Manual page 275

C10/c100/c1000 ap26 series wireless controller, access points and convergence software, v4.0
Hide thumbs Also See for HiPath C10:
Table of Contents

Advertisement

Term
IPsec
IPsec-ESP
IPsec-AH
isochronous
ISP
IV
LAN
License installation
LSA
Table 19
A31003-W1040-U101-1-7619, July 2006 DRAFT
HiPath Wireless Controller, Access Points and Convergence Software V4.0, C10/C100/C1000 User Guide
Explanation
Internet Protocol security (IPSec)
Internet Protocol security Encapsulating Security Payload (IPsec-
ESP). The encapsulating security payload (ESP) encapsulates its
data, enabling it to protect data that follows in the datagram.Internet
Protocol security Authentication Header (IPsec-AH). AH protects the
parts of the IP datagram that can be predicted by the sender as it will
be received by the receiver.IPsec is a set of protocols developed by the
IETF to support secure exchange of packets at the IP layer. IPsec has
been deployed widely to implement Virtual Private Networks (VPNs).
IPsec supports two encryption modes: Transport and Tunnel.
Transport mode encrypts only the data portion (payload) of each
packet, but leaves the header untouched. The more secure Tunnel
mode encrypts both the header and the payload. On the receiving
side, an IPSec-compliant device decrypts each packet. For IPsec to
work, the sending and receiving devices must share a public key. This
is accomplished through a protocol known as Internet Security
Association and Key Management Protocol/Oakley (ISAKMP/Oakley),
which allows the receiver to obtain a public key and authenticate the
sender using digital certificates.
Isochronous data is data (such as voice or video) that requires a
constant transmission rate, where data must be delivered within
certain time constraints. For example, multimedia streams require an
isochronous transport mechanism to ensure that data is delivered as
fast as it is displayed and to ensure that the audio is synchronized with
the video. Compare: asynchronous processes in which data streams
can be broken by random intervals, and synchronous processes, in
which data streams can be delivered only at specific intervals.
Internet Service Provider.
IV (Initialization Vector), part of the standard WEP encryption
mechanism that concatenates a shared secret key with a randomly
generated 24-bit initialization vector. WPA with TKIP uses 48-bit IVs,
an enhancement that significantly increases the difficulty in cracking
the encryption. (See WPA and TKIP)
Local Area Network.
Link State Advertisements received by the currently running OSPF
process. The LSAs describe the local state of a router or network,
including the state of the router's interfaces and adjacencies. See also
OSPF.
Networking terms and abbreviations
hwc_glossary.fm
Glossary
275

Advertisement

Table of Contents
loading

Table of Contents