Nortel 2360 Configuration Manual page 713

Wlan-security switch 2300 series
Hide thumbs Also See for 2360:
Table of Contents

Advertisement

CPC
Communications plenum cable. See plenum-rated cable.
CRC
Cyclic redundancy check. A primitive message integrity check.
crypto
See cryptography.
cryptography
The science of information security. Modern cryptography is typically concerned with the
processes of scrambling ordinary text (known as plain text or clear text) into encrypted text at the sender's end
of a connection, and decrypting the encrypted text back into clear text at the receiver's end. Because its
security is independent of the channels through which the text passes, cryptography is the only way of
protecting communications over channels that are not under the user's control. The goals of cryptography are
confidentiality, integrity, nonrepudiation, and authentication. The encrypted information cannot be understood
by anyone for whom it is not intended, or altered in storage or transmission without the alteration being
detected. The sender cannot later deny the creation or transmission of the information, and the sender and
receiver can confirm each other's identity and the information's origin and destination.
CSR
Certificate Signing Request. A message sent by an administrator to request a security certificate from a
certificate authority (CA). A CSR is a text string formatted by Privacy-Enhanced Mail (PEM) protocol
according to Public Key Cryptography Standard (PKCS) #10. The CSR contains the information needed by
the certificate authority to generate the certificate.
CSV file
Comma-separated values file. A text file that displays tabular data in a comma-delimited format,
as a list of rows in which each column's value is separated from the next by a comma. A CSV file is useful for
transferring data between database applications.
cyclic redundancy check
dBm
Decibels referred to 1 milliwatt (mW). A measurement of relative power related to 1 mW. For
example, 20 dBm corresponds to 10
decibels referred to 1 milliwatt (mW).
Data Encryption Standard
delivery traffic indication map
DES
Data Encryption Standard. A federally approved symmetric encryption algorithm in use for many years
and replaced by the Advanced Encryption Standard (AES). See also 3DES.
DHCP
Dynamic Host Configuration Protocol. A protocol that dynamically assigns IP addresses to stations,
from a centralized server. DHCP is the successor to the Bootstrap Protocol (BOOTP).
dictionary attack
with passwords that are based on a list of terms in a dictionary.
Diffie-Hellman
A key exchange algorithm that was the first public-key algorithm ever published.
Diffie-Hellman can be used anonymously (without authentication). Anonymous Diffie-Hellman is used to
establish the connection between the Nortel WLAN 2300 system WLAN Management Software tool suite and
a WLAN—Security Switch (WSS).
See CRC.
20 dBm/10
= 100 mW.
See DES.
See DTIM.
An attempt to gain illegal access to a computer or network by logging in repeatedly
Nortel WLAN—Security Switch 2300 Series Configuration Guide
Appendix A:Glossary 713
See dBm.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

23502361Wlan 2382

Table of Contents