Panasonic PT-VW345NZ Operating Instructions Manual page 137

Functional manual commercial use
Hide thumbs Also See for PT-VW345NZ:
Table of Contents

Advertisement

Item
Abbreviation of EAP-Message digest algorithm 5. It is one of the wireless
MD5
authentication methods compatible with IEEE 802.1X. Authentication is
(EAP-MD5)
performed with ID and password. Password is sent encrypted with challenge
& response method.
Abbreviation of EAP-Microsoft Challenge Handshake Authentication
MS-CHAPv2
Protocol v2. It is one of the wireless authentication methods compatible with
(EAP-MS-
IEEE 802.1X.It performs mutual authentication using a one-way encrypted
CHAPv2)
password.
Open System/
This is an authentication of wireless signals employing a public key
OPEN
encryptosystem.
Abbreviation for EAP-Protected EAP. It is one of the wireless authentication
methods compatible with IEEE 802.1X. It performs mutual authentication
PEAP
with a digital certificate by the authentication server, and ID/password by the
client.
RADIUS is an abbreviation of Remote Access Dial In User authentication
Service, and it is a protocol used for authentication in various networks such
as wireless LAN. An authentication server compatible with the protocol is
RADIUS server
called a RADIUS server.
The RADIUS server eliminates the need of registering user information
separately in each device even when there are multiple network devices,
and enables integrated management of multiple network devices and users.
This is a secret key encryptosystem for wireless signals in which
authentication is performed with a key pre-set in the WEP.
Shared Key/
Other terms for this method, in which the same key is used for both
SHARED
encryption and decryption, are "shared key encryptosystem" and "common
key encryptosystem".
Abbreviation for Service Set ID. The SSID identification code must be set to
distinguish equipment included in a wireless LAN that uses access points
SSID
from equipment not included in that LAN.
This may appear as the "ESSID" or the "network name" for wireless LAN
adapters made by some manufacturers.
This limits the range of the IP addresses assigned to computers in order to
SUBNET MASK
divide the network into a number of sections during TCP/IP connection. The
value used to divide the network at this time is called the subnetmask.
Abbreviation for Temporal Key Integrity Protocol.
TKIP
This encryption protocol provides even greater security than WEP because
it changes the encryption key at fixed intervals.
Abbreviation for Wired Equivalent Privacy. This is a method for encrypting
communication data. The encryption key is created and notified only to the
WEP
communicating user, so the communication data cannot be decrypted by a
third party.
Standard for the encryption method for wireless LAN. This is an encryption
WPA-EAP
method for corporations, and encryption is performed using the external
WPA2-EAP
server.
This is a standard covering encryption methods used in wireless LAN.
It provides greater security than WEP, and has functions such as a
WPA-PSK
user authentication function and also TKIP (encryption protocol) which
WPA2-PSK
automatically changes the encryption key at fixed intervals.
And this authentication requires no authentication server.
Chapter 6 Appendix - Glossary
Descriptions
See page
87
87
87
87
87
87
86
87
85
86
87
87
87
87
87
ENGLISH - 137

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pt-vx415nz

Table of Contents