G
LOSSARY
695
PTK
Pairwise transient key. A value derived from a pairwise master key
(PMK) and split into multiple encryption keys and message integrity
code (MIC) keys for use by a client and server as temporal session keys
for IEEE 802.11i robust security. See also
802.11i
.
public key
In cryptography, one of a pair of keys, one public and one private, that
are created with the same algorithm for encrypting and decrypting
messages and digital signatures. The public key is made publicly
available for encryption and decryption. See also
PKI
;
private key
.
Public-Key
Cryptography
Standards
See
PKCS
.
public-key
infrastructure
See
PKI
.
PVST+
Per-VLAN Spanning Tree protocol. A proprietary Cisco protocol that
supports a separate instance of the Spanning Tree Protocol (STP) for
each virtual LAN (VLAN) in a network and maps the multiple spanning
trees to a single tree, to comply with the IEEE 802.1Q specification. See
also
STP
.
QoS
Quality of service. A networking technology that seeks to measure,
improve, and guarantee transmission rates, error rates, and other
performance characteristics, based on priorities, policies, and reservation
criteria arranged in advance. Some protocols allow packets or streams
to include QoS requirements.
quality of service
See
QoS
.
RA
See
registration authority (RA)
.
radio profile
A group of parameters, such as the beacon interval, fragmentation
threshold, and security policies, that you configure in common across a
set of radios in one or more Managed Access Points (MAPs). A few
parameters, such as the radio name and channel number, must be set
separately for each radio.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...