698
G
LOSSARY
seed
(1) An input to a pseudorandom number generator (PRNG), that is
generally the combination of two or more inputs. (2) The Wireless
Switch (WX) that distributes information to all the WX switches in a
Mobility Domain™ group.
SentrySweep™
A radio frequency (RF) detection sweep that runs continuously on the
disabled radios in a Mobility Domain™ group. See also
RF detection
sweep
.
session
A related set of communication transactions between an authenticated
user (client) and the specific station to which the client is bound.
Session Initialization
Protocol
See
SIP
.
service set identifier
See
SSID
.
SHA
Secure hashing algorithm. A one-way hashing algorithm used in many
authentication algorithms and also for key derivation in many
algorithms. A SHA produces a 160-bit hash.
shared secret
A static key distributed by an out-of-band mechanism to both the
sender and receiver. Also known as a
shared key
or
preshared key
(PSK)
, a shared secret is used as input to a one-way hash algorithm.
When a shared secret is used for authentication, if the hash output of
both sender and receiver is the same, they share the same secret and
are authenticated. A shared secret can also be used for encryption key
generation and key derivation.
SIP
Session Initialization Protocol. A signaling protocol that establishes
real-time calls and conferences over IP networks.
Spanning Tree
Protocol
See
STP
.
SSH
Secure Shell protocol. A Telnet-like protocol that establishes an
encrypted session.
SSID
Service set identifier. The unique name shared among all computers
and other devices in a wireless LAN (WLAN).
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...