684
G
LOSSARY
GMK
Group master key. A cryptographic key used to derive a group transient
key (GTK) for the Temporal Key Integrity Protocol (TKIP) and Advanced
Encryption Standard (AES).
greenfield network
An original deployment of a telecommunications network.
GRE tunnel
A virtual link between two remote points on a network, created by
means of the Generic Routing Encapsulation (GRE) tunneling protocol.
GRE encapsulates packets within a transport protocol supported by the
network.
GTK
Group transient key. A cryptographic key used to encrypt broadcast and
multicast packets for transmissions using the Temporal Key Integrity
Protocol (TKIP) and Advanced Encryption Standard (AES).
group master key
See
GMK
.
group transient key
See
GTK
.
H.323
A set of International Telecommunications Union Telecommunication
Standardization Sector (ITU-T) standards that define a framework for
the transmission of real-time voice signals over IP packet-switched
networks.
hash
A one-way algorithm from whose output the input is computationally
infeasible to determine. With a good hashing algorithm you can
produce identical output from two identical inputs, but finding two
different inputs that produce the same output is computationally
infeasible. Hash functions are used widely in authentication algorithms
and for key derivation procedures.
HiperLAN
High-performance radio local area network. A set of wireless LAN
(WLAN) communication standards used primarily in European countries
and adopted by the European Telecommunications Standards Institute
(ETSI).
HMAC
Hashed message authentication code. A function, defined in RFC 2104,
for keyed hashing for message authentication. HMAC is used with
MD5 and the secure hash algorithm (SHA).
hashed message
authentication code
See
HMAC
.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...