Nortel 2360 Configuration Manual page 726

Wlan-security switch 2300 series
Hide thumbs Also See for 2360:
Table of Contents

Advertisement

726 Appendix A:Glossary
subnet mobility
Security Switch (WSS) switches in a virtual LAN (VLAN) while maintaining a single IP address and
associated data sessions.
supplicant
syslog server
Software) supports up to four syslog servers on virtual LANs (VLANs) whose locations are configurable.
WSS Software log protocol complies with RFC 3164.
Temporal Key Integrity Protocol
TKIP
Temporal Key Integrity Protocol. A wireless encryption protocol that fixes the known problems in the
Wired-Equivalent Privacy (WEP) protocol for existing IEEE 802.11 products. Like WEP, TKIP uses RC4
ciphering, but adds functions such as a 128-bit encryption key, a 48-bit initialization vector, a new message
integrity code (MIC), and initialization vector (IV) sequencing rules to provide better protection. See also
802.11i; CCMP.
TLS
Transport Layer Security protocol. An authentication and encryption protocol that is the successor to
the Secure Sockets Layer (SSL) protocol for private transmission over the Internet. Defined in RFC 2246, TLS
provides mutual authentication with nonrepudiation, encryption, algorithm negotiation, secure key derivation,
and message integrity checking. TLS has been adapted for use in wireless LANs (WLANs) and is used widely
in IEEE 802.1X authentication. See also EAP-TLS; PEAP; TTLS.
TLV
Type, length, and value. A methodology for coding parameters within a frame. Type indicates a
parameter's type, length indicates the length of its value, and value indicates the parameter's value.
Transport Layer Security protocol
TTLS
Tunneled Transport Layer Security. An Extensible Authentication Protocol (EAP) method developed
by Funk Software, Inc., and Certicom for 802.1X authentication. TTLS uses a combination of certificates and
password challenge and response for authentication. The entire EAP subprotocol exchange of attribute-value
pairs takes place inside an encrypted transport layer security (TLS) tunnel. TTLS supports authentication
methods defined by EAP, as well as the older Challenge Handshake Authentication Protocol (CHAP),
Password Authentication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2. Compare
EAP-TLS; PEAP.
Tunneled Transport Layer Security subprotocol
tunneling
The transmission of data by one network through the connections of another network by
encapsulating its data and protocol information within the other network's transmission units. To forward
traffic for a roaming user within a Mobility Domain™ group, a WLAN—Security Switch (WSS) that is not a
member of the user's virtual LAN (VLAN) creates a tunnel to another WSS on which the user's VLAN is
configured.
type, length, and value
U-NII
Unlicensed National Information Infrastructure. Three unlicensed frequency bands of 100 MHz each
in the 5 GHz band, designated by the U.S. Federal Communications Commission (FCC) to provide high-speed
wireless networking. The three frequency bands—5.15 GHz through 5.25 GHz (for indoor use only),
5.25 GHz through 5.35 GHz, and 5.725 GHz through 5.825 GHz—were allocated in 1997.
Unlicensed National Information Infrastructure
NN47250-500 (320657-F Version 02.01)
The ability of a wireless user (client) to roam across Access Point (AP) and WLAN—
A client that is attempting to access a network.
A remote repository for log messages. Nortel WLAN Security Switch 2300 Series (WSS
See TLV.
See TKIP.
See TLS.
See TTLS.
See U-NII.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

23502361Wlan 2382

Table of Contents