Siemens SCALANCE W1750D CLI Function Manual page 735

Simatic net industrial wireless lan
Table of Contents

Advertisement

DSSS
DST
DTE
DTIM
DTLS
dynamic au-
thorization
dynamic NAT Dynamic Network Address Translation. Dynamic NAT maps multiple public
EAP
EAP-FAST
EAP-GTC
EAP-MD5
EAP-MSCHAP EAP Microsoft Challenge Handshake Authentication Protocol.
EAP-
MSCHAPv2
EAPoL
EAP-PEAP
EAP-PWD
EAP-TLS
EAP-TTLS
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
Direct-Sequence Spread Spectrum. DSSS is a modulation technique used
for reducing overall signal interference. This technique multiplies the original
data signal with a pseudo random noise spreading code. Spreading of this
signal makes the resulting wideband channel more noisy, thereby increasing
the resistance to interference. See FHSS.
Daylight Saving Time. DST is also known as summer time that refers to the
practice of advancing clocks, so that evenings have more daylight and morn-
ings have less. Typically clocks are adjusted forward one hour near the start
of spring and are adjusted backward in autumn.
Data Terminal Equipment. DTE refers to a device that converts user infor-
mation into signals or re-converts the received signals.
Delivery Traffic Indication Message. DTIM is a kind of traffic indication map.
A DTIM interval determines when the APs must deliver broadcast and mul-
ticast frames to their associated clients in power save mode.
Datagram Transport Layer Security. DTLS communications protocol provides
communications security for datagram protocols.
Dynamic authorization refers to the ability to make changes to a visitor ac-
count's session while it is in progress. This might include disconnecting a
session or updating some aspect of the authorization for the session.
IP addresses and uses these addresses with an internal or private IP ad-
dress. Dynamic NAT helps to secure a network by masking the internal con-
figuration of a private network.
Extensible Authentication Protocol. An authentication protocol for wireless
networks that extends the methods used by the PPP, a protocol often used
when connecting a computer to the Internet. EAP can support multiple au-
thentication mechanisms, such as token cards, smart cards, certificates, one-
time passwords, and public key encryption authentication.
EAP – Flexible Authentication Secure Tunnel (tunneled).
EAP – Generic Token Card. (non-tunneled).
EAP – Method Digest 5. (non-tunneled).
EAP Microsoft Challenge Handshake Authentication Protocol Version 2.
Extensible Authentication Protocol over LAN. A network port authentication
protocol used in IEEE 802.1X standards to provide a generic network sign-on
to access network resources.
EAP–Protected EAP. A widely used protocol for securely transporting au-
thentication data across a network (tunneled).
EAP-Password. EAP-PWD is an EAP method that uses a shared password
for authentication.
EAP–Transport Layer Security. EAP-TLS is a certificate-based authentication
method supporting mutual authentication, integrity-protected ciphersuite ne-
gotiation and key exchange between two endpoints. See RFC 5216.
EAP–Tunneled Transport Layer Security. EAP-TTLS is an EAP method that
encapsulates a TLS session, consisting of a handshake phase and a data
phase. See RFC 5281.
Appendix A
A.1 Glossary of Terms
735

Advertisement

Table of Contents
loading

Table of Contents