G
LOSSARY
703
WEP
Wired-Equivalent Privacy protocol. A security protocol, specified in the
IEEE 802.11 standard, that attempts to provide a wireless LAN (WLAN)
with a minimal level of security and privacy comparable to a typical
wired LAN. WEP encrypts data transmitted over the WLAN to protect
the vulnerable wireless connection between users (clients) and access
points (APs). Although appropriate for most home use, WEP is weak
and fundamentally flawed for enterprise use. Compare
AES
;
CCMP
;
TKIP
.
Wi-Fi Alliance
An organization formed by leading wireless equipment and software
providers, for certifying all IEEE 802.11 wireless LAN (WLAN) products
for interoperability and promoting the term
Wi-Fi
as their global brand
name. Only products that pass Wi-Fi Alliance testing can be certified.
Certified products are required to carry an identifying seal on their
packaging stating that the product is Wi-Fi certified
and indicating the
radio frequency band used (2.4 GHz for 802.11b and 5 GHz for
802.11a, for example). The Wi-Fi Alliance was formerly known as the
Wireless Ethernet Compatibility Alliance (WECA)
.
Wi-Fi Protected
Access
See
WPA
.
wildcard mask
A 32-bit quantity used with an IP address to determine which bits in
the address to ignore in a comparison with another IP address. When
setting up security access control lists (ACLs), you specify source and
destination IP addresses and corresponding wildcard masks by which
the WX switch determines whether to forward or filter packets. The
security ACL checks the bits in IP addresses that correspond to any
0
s
(zeros) in the mask, but does not check the bits that correspond to
1
s
(ones) in the mask.
wired authentication
port
An Ethernet port that has 802.1X authentication enabled for access
control.
Wired-Equivalent
Privacy protocol
See
WEP
.
Wireless Ethernet
Compatibility
Alliance
See
Wi-Fi Alliance
.
wireless Internet
service provider
See
WISP
.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...