690
G
LOSSARY
message integrity
code
See
MIC
.
MIC
Message integrity code. The IEEE term for a message authentication
code (MAC). See
MAC
.
Microsoft Challenge
Handshake
Authentication
Protocol
See
MS-CHAP-V2
.
minimum data
transmit rate
The lowest rate at which a Managed Access Point (MAP) can transmit
data to its associated mobile clients. If the data rate to a client drops
below the minimum, the MAP increases power, if RF Auto-Tuning is
enabled.
Mobility Domain™
A collection of Wireless Switches (WXs) working together to support a
roaming user (client).
Mobility Profile™
A user (client) authorization attribute that specifies the Managed Access
Points (MAPs) or wired authentication ports the client can use in a
Mobility Domain™ group.
Mobility System
Software™ (MSS™)
The 3Com operating system, accessible through a command-line
interface (CLI) or the 3Com Wireless Switch Manager (3WXM) tool
suite, that enables 3Com Mobility System products to operate as a
single system. Mobility System Software (MSS) performs authentication,
authorization, and accounting (AAA) functions; manages Wireless
Switches (WXs) and Managed Access Points (MAPs); and maintains the
wireless LAN (WLAN) by means of such network structures as Mobility
Domain™ groups, virtual LANs (VLANs), tunnels, spanning trees, and
link aggregation.
MPDU
MAC protocol data unit. In IEEE 802.11 communications, the data unit
(or
frame
) that two peer media access control (MAC) service access
points (SAPs) exchange through the services of the Physical layer (PHY).
An MPDU consists of MAC headers and a MAC service data unit
(MSDU). See also
MSDU
.
MS-CHAP-V2
Microsoft Challenge Handshake Authentication Protocol version 2.
Microsoft’s extension to CHAP. MS-CHAP-V2 is a mutual authentication
protocol, defined in RFC 2759, that also permits a single login in a
Microsoft network environment. See also
CHAP
.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...