G
LOSSARY
679
DES
Data Encryption Standard. A federally approved symmetric encryption
algorithm in use for many years and replaced by the Advanced
Encryption Standard (AES). See also
3DES
.
DHCP
Dynamic Host Configuration Protocol. A protocol that dynamically
assigns IP addresses to stations, from a centralized server. DHCP is the
successor to the Bootstrap Protocol (BOOTP).
dictionary attack
An attempt to gain illegal access to a computer or network by logging
in repeatedly with passwords that are based on a list of terms in a
dictionary.
Diffie-Hellman
A key exchange algorithm that was the first public-key algorithm ever
published. Diffie-Hellman can be used anonymously (without
authentication). Anonymous Diffie-Hellman is used to establish the
connection between the 3Com Wireless Switch Manager (3WXM) and
a Wireless Switch (WX).
Diffserv
Differentiated services. An architecture for providing different types or
levels of service for network traffic. Diffserv aggregates flows in the
network so that routers and switches need to distinguish only a
relatively small number of aggregated flows, even if those flows contain
thousands or millions of individual flows.
digital certificate
A document containing the name of a user (client) or server, a digital
signature, a public key, and other elements used in authentication and
encryption. See also
X.509
.
digital signature
The result of encrypting a hash of a message or document with a
private key. A digital signature is used to verify the authenticity of the
sender and the integrity (unaltered condition) of the message or
document. See also
hash
.
Digital Signature
Algorithm
See
DSA
.
direct-sequence
spread-spectrum
See
DSSS
.
domain
(1) On the Internet, a set of network addresses that are organized in
levels. (2) In Microsoft Windows NT and Windows 2000, a set of
network resources (applications, printers, and so forth) for a group of
users (clients). Clients log into the domain to access the resources,
which can be located on a number of different servers in the network.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...