Nortel 2360 Configuration Manual page 724

Wlan-security switch 2300 series
Hide thumbs Also See for 2360:
Table of Contents

Advertisement

724 Appendix A:Glossary
restricted access
command-line interface (CLI) commands required for viewing status information (show commands), except
those that list security information in clear text. Users with restricted access can clear ARP requests and ping
hosts. Compare enabled access.
RF detection sweep
Domain™ group, to locate rogue clients, rogue access points, and ad hoc users. A sweep can be either a
scheduled sweep or a continuous SentrySweep™ search. During a scheduled sweep, each included Access
Point (AP) radio sweeps all channels in the IEEE 802.11b/g and 802.11a spectrum. In contrast, SentrySweep
operates only on the disabled radios in a Mobility Domain and does not disrupt service.
WLAN Management Software™
a Nortel WLAN 2300 system wireless LAN (WLAN). Based on site and user requirements, WLAN
Management Software determines the location of WLAN—Security Switches (WSSs) and Access Point (AP)
and can store and verify configuration information before installation. After installation, WLAN Management
Software deploys the settings on the equipment and manages and verifies configuration changes. To monitor
network performance, WLAN Management Software collects WSS and AP information, calculates and
displays AP neighbor relationships, and detects anomalous events—for example, rogue access points.
roaming
The ability of a wireless user (client) to maintain network access when moving between APs.
robust security network
rogue access point
points subvert the security of an enterprise network by allowing potentially unchallenged access to the
enterprise network by any wireless user (client) in the physical vicinity.
rogue client
intercepting and modifying transmissions to circumvent the normal authorization and authentication
processes.
RSA
A public-key algorithm developed in 1977 by RSA Data Security, Inc., used for encryption, digital
signatures, and key exchange.
RSN
Robust security network. A secure wireless LAN (WLAN) based on the developing IEEE 802.11i
standard.
RSSI
Received signal strength indication. The received strength of an incoming radio frequency (RF) signal,
typically measured in decibels referred to 1 milliwatt (dBm).
scalability
performance.
secure hashing algorithm
Secure Shell protocol
Secure Sockets Layer protocol
NN47250-500 (320657-F Version 02.01)
Permission to use most WLAN Security Switch 2300 Series (WSS Software)
A comprehensive search for radio frequency (RF) signals within a Mobility
See RSN.
An AP that is not authorized to operate within a wireless network. Rogue access
A user (client) who is not recognized within a network, but who gains access to it by
The ability to adapt easily to increased or decreased requirements without impairing
See SHA.
See SSH.
A tool suite for planning, configuring, deploying, and managing
See SSL.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

23502361Wlan 2382

Table of Contents