
– 78 –
G
LOSSARY
10BASE-T
IEEE 802.3-2005 specification for 10 Mbps Ethernet over two pairs of
Category 3 or better UTP cable.
100BASE-TX
IEEE 802.3-2005 specification for 100 Mbps Fast Ethernet over two pairs of
Category 5 or better UTP cable.
A
DVANCED
E
NCRYPTION
S
TANDARD
(AES)
An encryption algorithm that implements symmetric key cryptography. AES
provides very strong encryption using a completely different ciphering
algorithm to TKIP and WEP.
A
UTHENTICATION
The process to verify the identity of a client requesting network access.
IEEE 802.11 specifies two forms of authentication: open system and
shared key.
B
ACKBONE
The core infrastructure of a network. The portion of the network that
transports information from one central location to another central location
where it is unloaded onto a local system.
B
EACON
A signal periodically transmitted from the CPE that is used to identify the
service set, and to maintain contact with wireless clients.
B
ROADCAST
K
EY
Broadcast keys are sent to stations using dynamic keying. Dynamic
broadcast key rotation is often used to allow the CPE to generate a random
group key and periodically update all key-management capable wireless
clients.
D
YNAMIC
H
OST
C
ONFIGURATION
P
ROTOCOL
(DHCP)
Provides a framework for passing configuration information to hosts on a
TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding
the capability of automatic allocation of reusable network addresses and
additional configuration options.
E
NCRYPTION
Data passing between the CPE and clients can use encryption to protect
from interception and evesdropping.
Summary of Contents for RG211-2.3G
Page 1: ...USER GUIDE WIMAX 802 16E INDOOR CPE RG211 2 3 2 5 3 5 3 8G ...
Page 43: ...CHAPTER 5 WiMAX Settings Integration Time 43 ...
Page 49: ...CHAPTER 7 NAT Settings Demilitarized Zone DMZ 49 ...
Page 51: ...CHAPTER 8 Firewall Settings Firewall Settings 51 ...
Page 59: ...CHAPTER 9 Management Settings TR Parameters 59 ...
Page 67: ...CHAPTER 11 Logout Logging Out 67 ...
Page 82: ...INDEX 82 W WAN settings 29 ...
Page 83: ...INDEX 83 ...