Extreme Networks Summit WM User Manual page 322

Table of Contents

Advertisement

Glossary
Term
VSA
Walled Garden
WEP
Wi-Fi
WINS
WLAN
WM-AD
WMM
WPA
322
Explanation
Vendor Specific Attribute, an attribute for a RADIUS server defined by the
manufacturer.(compared to the RADIUS attributes defined in the original
RADIUS protocol RFC2865). A VSA attribute is defined in order that it can
be returned from the RADIUS server in the Access Granted packet to the
Radius Client.
A restricted subset of network content that wireless devices can access.
Wired Equivalent Privacy. A security protocol for wireless local area
networks (WLANs) defined in the 802.11b standard. WEP aims to provide
security by encrypting data over radio waves so that it is protected as it is
transmitted from one end point to another.
Wireless fidelity. A term referring to any type of 802.11 network, whether
802.11b, 802.11a, dual-band, etc. Used in reference to the Wi-Fi Alliance, a
nonprofit international association formed in 1999 to certify interoperability
of wireless Local Area Network products based on IEEE 802.11
specification.
Windows Internet Naming Service. A system that determines the IP
address associated with a particular network computer, called name
resolution. WINS supports network client and server computers running
Windows and can provide name resolution for other computers with
special arrangements. WINS supports dynamic addressing (DHCP) by
maintaining a distributed database that is automatically updated with the
names of computers currently available and the IP address assigned to each
one.
DNS is an alternative system for name resolution suitable for network
computers with fixed IP addresses.
Wireless Local Area Network.
WM Access Domain Services (WM-AD). A Extreme Networks specific
technique that provides a means of mapping wireless networks to a wired
topology.
Wi-Fi Multimedia (WMM), a Wi-Fi Alliance certified standard that
provides multimedia enhancements for Wi-Fi networks that improve the
user experience for audio, video, and voice applications. This standard is
compliant with the IEEE 802.11e Quality of Service (QoS) extensions for
802.11 networks. WMM provides prioritized media access by shortening
the time between transmitting packets for higher priority traffic. WMM is
based on the Enhanced Distributed Channel Access (EDCA) method.
Wireless Protected Access, or Wi-Fi Protected Access is a security solution
adopted by the Wi-Fi Alliance that adds authentication to WEPs' basic
encryption. For authentication, WPA specifies IEEE 802.1X authentication
with Extensible Authentication Protocol (EAP). For encryption, WPA uses
the Temporal Key Integrity Protocol (TKIP) mechanism, which shares a
starting key between devices, and then changes their encryption key for
every packet. Certificate Authentication (CA) can also be used. Also part of
the encryption mechanism are 802.1X for dynamic key distribution and
Message Integrity Check (MIC) a.k.a. Michael.
WPA requires that all computers and devices have WPA software.
Summit WM User Guide, Software Version 5.3

Advertisement

Table of Contents
loading

Table of Contents