676
G
LOSSARY
BSSID
Basic service set identifier. The 48-bit media access control (MAC)
address of the radio in the access point (AP) that serves the stations in
a basic service set (BSS).
CA
See
certificate authority (CA)
.
CBC-MAC
See
CCMP
.
CCI
Co-channel interference. Obstruction that occurs when one signal on a
particular frequency intrudes into a cell that is using that same
frequency for transmission. In multicell networks, systems are designed
to minimize CCI through appropriate transmission power and channel
selection.
CCMP
Counter-Mode with Cipher Block Chaining Message Authentication
Code Protocol. A wireless encryption protocol based on the Advanced
Encryption Standard (AES) and defined in the IEEE 802.11i specification.
CCMP uses a symmetric key block cipher mode that provides privacy by
means of counter mode and data origin authenticity by means of
cipher block chaining message authentication code (CBC-MAC). See
also
802.11i
;
AES
;
TKIP
;
WPA
. Compare
WEP
.
cell
The geographical area covered by a wireless transmitter.
certificate authority
(CA)
Network software that issues and manages security credentials and
public keys for authentication and message encryption. As part of a
public-key infrastructure (PKI), which enables secure exchanges of
information over a network, a certificate authority checks with a
registration authority (RA) to verify information provided by the
requestor of a digital certificate. If the registration authority verifies the
requestor’s information, the certificate authority can issue a certificate.
Based on the PKI implementation, the certificate content can include
the certificate’s expiration date, the owner’s public key, the owner’s
name, and other information about the public-key owner. See also
registration authority (RA)
.
Certificate Signing
Request
See
CSR
.
Challenge Handshake
Authentication
Protocol
See
CHAP
.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...