696
G
LOSSARY
RADIUS
Remote Authentication Dial-In User Service. A client-server security
protocol described in RFC 2865 and RFC 2866. RADIUS extensions,
including RADIUS support for the Extensible Authentication Protocol
(EAP), are described in RFC 2869. Originally developed by Livingston
Enterprises, Inc., to authenticate, authorize, and account for dial-up
users, RADIUS has been widely extended to broadband and enterprise
networking. The RADIUS server stores user profiles, which include
passwords and authorization attributes.
RC4
A common encryption algorithm, designed by RSA Data Security, Inc.,
used by the Wired-Equivalent Privacy (WEP) protocol and Temporal Key
Integrity Protocol (TKIP).
received signal
strength indication
See
RSSI
.
registration authority
(RA)
Network software that verifies a user (client) request for a digital
certificate and instructs the certificate authority (CA) to issue the
certificate. Registration authorities are part of a public-key infrastructure
(PKI), which enables secure exchanges of information over a network.
The digital certificate contains a public key for encrypting and
decrypting messages and digital signatures.
Remote
Authentication
Dial-In User Service
See
RADIUS
.
restricted access
Permission to use most Mobility System Software (MSS) command-line
interface (CLI) commands required for viewing status information
(
display
commands), except those that list security information in clear
text. Users with restricted access can clear ARP requests and ping hosts.
Compare
enabled access
.
RF detection sweep
A comprehensive search for radio frequency (RF) signals within a
Mobility Domain™ group, to locate rogue clients, rogue access points,
and ad hoc users. A sweep can be either a scheduled sweep or a
continuous
SentrySweep™
search. During a scheduled sweep, each
included Managed Access Point (MAP) radio sweeps all channels in the
IEEE 802.11b/g and 802.11a spectrum. In contrast, SentrySweep
operates only on the disabled radios in a Mobility Domain and does not
disrupt service.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...