686
G
LOSSARY
IGMP snooping
A feature that prevents the flow of multicast stream packets within a
virtual LAN (VLAN) and forwards the multicast traffic through a path to
only the clients that want to receive it. A Wireless Switch (WX) uses
IGMP snooping to monitor the Internet Group Management Protocol
(IGMP) conversation between hosts and routers. When the WX detects
an IGMP report from a host for a given multicast group, it adds the
host’s port number to the list for that group. When it detects an IGMP
host leaving a group, the WX removes the port number from the group
list.
Industry Canada
See
IC
.
information element
See
WPA IE
.
infrastructure
network
One of two IEEE 802.11 network frameworks. In an infrastructure
network, all communications are relayed through an access point (AP).
Wireless devices can communicate with each other or with a wired
network. The network is defined by the distance of mobile stations
from the access point, but no restriction is placed on the distance
between stations. Stations must request association with the access
point to obtain network services, which the access point can grant or
deny based on the contents of the association request. Like most
corporate wireless LANs (WLANs), which must access a wired LAN for
file servers and printers, a 3Com Mobility System is an infrastructure
network. Compare
ad hoc network
.
initialization vector
(IV)
In encryption, random data used to make a message unique.
Institute of Electrical
and Electronic
Engineers
See
IEEE
.
integrity check value
See
ICV
.
interface
A place at which independent systems meet and act on or
communicate with each other, or the means by which the interaction
or communication is accomplished.
International
Organization for
Standardization
See
ISO
.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...