704
G
LOSSARY
wireless LAN
See
WLAN
.
Wireless Switch™
(WX™)
A switch in a 3Com Mobility System. A WX provides forwarding,
queuing, tunneling, and some security services for the information it
receives from its directly attached Managed Access Points (MAPs). In
addition, the WX coordinates, provides power to, and manages the
configuration of each attached MAP, by means of the MAP Control
Protocol.
WISP
Wireless Internet service provider. A company that provides public
wireless LAN (WLAN) services.
WLAN
Wireless LAN. A LAN to which mobile users (clients) can connect and
communicate by means of high-frequency radio waves rather than
wires. WLANs are defined in the IEEE 802.11 standard.
WPA
Wi-Fi Protected Access. The Wi-Fi Alliance’s version of the Temporal Key
Integrity Protocol (TKIP) that also includes a message integrity code
(MIC) known as
Michael
. Although WPA provides greater wireless
security than the Wired-Equivalent Privacy protocol (WEP), WPA is not
as secure as IEEE 802.11i, which includes both the RC4 encryption used
in WEP and Advanced Encryption Standard (AES) encryption, but is not
yet ratified by IEEE. See also
AES
;
RC4
;
TKIP
.
WPA IE
A set of extra fields in a wireless frame that contain Wi-Fi Protected
Access (WPA) information for the access point or client. For example, a
Managed Access Point (MAP) uses the WPA IE in a beacon frame to
advertise the cipher suites and authentication methods that the MAP
supports for its encrypted SSID.
WPA information
element
See
WPA IE
.
WX™
See
Wireless Switch™ (WX™)
.
X.500
A standard of the International Organization for Standardization (ISO)
and International Telecommunications Union Telecommunication
Standardization Sector (ITU-T), for systematically collecting the names of
people in an organization into an electronic directory that can be part
of a global directory available to anyone in the world with Internet
access.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...