436
DWS-1008 User’s Manual
D-Link Systems, Inc.
Appendix D - Glossary
TTLS
Tunneled Transport Layer Security. An Extensible Authentication Protocol (EAP) method
developed by Funk Software, Inc., and Certicom for 802.1X authentication. TTLS uses a
combination of certificates and password challenge and response for authentication. The
entire EAP subprotocol exchange of attribute-value pairs takes place inside an encrypted
transport layer security (TLS) tunnel. TTLS supports authentication methods defined by
EAP, as well as the older Challenge Handshake Authentication Protocol (CHAP), Password
Authentication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2. Compare
EAPTLS
;
PEAP
.
Trapeze Access Point Access protocol
See
TAPA™
.
Tunneled Transport Layer Security subprotocol
See
TTLS
.
tunneling
The transmission of data by one network through the connections of another network by
encapsulating its data and protocol information within the other network’s transmission
units. To forward traffic for a roaming user, a DWS-1008 switch that is not a member of the
user’s virtual LAN (VLAN) creates a tunnel to another switch on which the user’s VLAN is
configured.
type, length, and value
See
TLV
.
U-NII
Unlicensed National Information Infrastructure. Three unlicensed frequency bands of 100 MHz
each in the 5 GHz band, designated by the U.S. Federal Communications Commission
(FCC) to provide highspeed wireless networking. The three frequency bands—5.15 GHz
through 5.25 GHz (for indoor use only), 5.25 GHz through 5.35 GHz, and 5.725 GHz through
5.825 GHz—were allocated in 1997.
Unlicensed National Information Infrastructure
See
U-NII
.
user
A person who uses a client. In a D-Link network, users are indexed by username and
associated with authorization attributes such as user group membership.
Summary of Contents for DWS-1008
Page 1: ......