2
MonarchNet2 Operating Instructions
Extensible
Au thenticatio n
Protocol)
the W EP key time limits provides additional security.
LPD/LP R
A printer protocol that us es TCP/IP to establish connections between printer s on a netwo rk.
Also known as Line Printe r Daemon/Line Printer Re mote.
MAC Add ress or
Media Access
Control
A hard ware address (6-b yte) that uniquely identifie s each node of a network. The MA C
address is set during manufacturing and does not change. Also, t wo Net wor k Interface
Cards (NI C)
w ill not
have the same value.
MSCHAP v2
(Challenge
Handshake
Au thenticatio n
Protocol)
MSCHAP v2 is the Microsoft® version of CHAP. It is a three- way handshake protocol that is
more secure than PAP.
It provides mutual authen tication between de vices.
NIC o r
Netw ork
Interface Ca rd
An adapter (board or card ) that can be inserted into a device, so the device c an be
connected to a network. The NIC con verts data fro m the device into the for m transmitted or
received from the net work
Node
A processing location on a netwo rk. The location can be a workstation, computer, or printer.
Each Node has a unique MAC address.
Open
Au thenticatio n
This allo ws any device to authenticate and then attempt to communicate with the access
point. Any wireless devic e can authenticate with th e access point, but if W EP is used, the
device can communicate only if its W EP keys match the access point's. The re is no
challenge that occurs, you either have the correct key or not when you com municate with the
access point. By eliminating the challenge process, it actually makes this more secure than
shared key authentication.
P AP ( Passw ord
Au thenticatio n
Protocol)
A simple authentication protocol used with P PP ( P oint-to-Point Protocol). I t is a plain te xt
password s ystem, which is not ver y secure.
Pathname
The location of a particul ar file or directory that includes the full path to the needed filename
or directory. This is a co mbination of path and filename.
PE AP (Pro tected
Extensible
Au thenticatio n
Protocol)
Authenticates clients into a netwo rk using only ser ver-side certificates, which makes
implementing and administering a wireless LAN eas ier.
Ping
A wa y to determine if a d evice is accessible. It sends a packet to the specified address and
waits fo r a reply.
Protocol
This is the wa y t wo de vic es transmit data between each other, including error checking, data
compression, and how messages start and end.
PSK
(Pre-Sha red
Ke y)
Authentication mode of W PA used in SOHO en viron ments.
The ke y value (or pass-phrase) is used for net work authentication only (not d ata encryption).
It does not use a RADI US server like the other mod es, but uses a shared key to provide the
initial authentication with the access point or host.
RADI US ( Remote
Au thenticatio n
Dial-In Se rver)
This is an authentication server, such as the Cisco® ACS, Microsoft ® IA S, e tc.
RARP or
Reve rse
Ad dress
Resolution
Protocol
One of the a vailable boot methods. The device sen ds an RARP request and the RARP
server responds with an I P address. The de vice knows its MAC address and the server
responds with the I P addr ess for it.
Relati ve
Pathname
The file or director y locati on on the user’s system relative to the user’s curre nt location on
the system ( what director y the user is currentl y in). For e xample,
mpcl too l box\9855.phu
Router
Any de vice that for wa rds data along netwo rks. Ro uters are located at gatewa ys.
Shared
Au thenticatio n
The access point sends an unencrypted challenge te xt string to an y de vice attempting to
communicate with it. The device requesting authentication encrypts the challenge te xt and
sends it back to the access point. If the challenge te xt is encryp ted correctly, the access
point allows the requestin g device to authenticate. Both the unencrypted ch allenge and the
encrypted challenge can be monitored; howe ver, this leaves the access point open to attack.
Because of this weakness, shared key authentication can be less secure than open
authentication.
Summary of Contents for ADTP1 MonarchNet2
Page 4: ......
Page 22: ...2 16 MonarchNet2 Operating Instructions ...
Page 34: ...4 4 MonarchNet2 Operating Instructions ...
Page 38: ......
Page 39: ......