ENGLISH -
117
Appendix
Glossary
Item
Descriptions
See
page
Access point
These are stations for relaying electromagnetic signals between computers
in a wireless LAN. When a computer is connected to an access point, it can
communicate through the network connected to the access point.
69
AD HOC
This is the mode in which computers communicate with each other directly,
rather than via access points.
69
AES
Next generation standard cryptography standardized by the National Institute of
Standards and Technology (NIST).
AES: Advanced Encryption Standard
69
Default Gateway
The devices that are used for different network standards from yours. Default
Gateway enables a connection with other network, by adjusting bilateral
differences such as communication protocols. If no gateway is specified for the
IP address of access destination, data will be sent to the host set as the default
gateway.
67
68
75
DHCP
Abbreviation for Dynamic Host Configuration Protocol. This function
automatically assigns IP addresses to the connected equipment. If a device with
the DHCP server function is present within a LAN, it automatically assigns IP
addresses to the connected equipment.
67
68
75
EAP
Abbreviation of PPP Extensible Authentication Protocol. An authentication
protocol extended from PPP, which is used for user authentication for remote
access. MD5, TLS, S/Key, etc. are supported as authentication methods. This
protocol is adopted by the wireless LAN authentication standard IEEE 802.1X,
and available methods include EAP-TLS/EAP-TTLS/EAP-LEAP/EAP-PEAP/
EAP-MD5.
70
EAP-FAST
Abbreviation of EAP-Flexible Authentication via Secure Tunneling. It is one of
the wireless authentication methods compatible with IEEE 802.1X. It does not
require digital authentication, but establishes a tunnel for the authentication
process using a secret key cryptosystem, and authenticates the tunnel mutually
to improve security. Cisco’s proprietary method.
70
EAP-TTLS
Abbreviation of EAP-Tunneled Transport Layer Security. It is one of the wireless
authentication methods compatible with IEEE 802.1X. It performs mutual
authentication with a digital certificate by the authentication server, and ID/
password by the client. A tunnel is established for the authentication process.
Developed by Func Software in the U.S.
70
GTC
(EAP-GTC)
Abbreviation of EAP-Generic Token Card. It is one of the wireless authentication
methods compatible with IEEE 802.1X. Authentication is performed with ID and
password. Password is acquired from a security token.
70
INFRASTRUCTURE
(infrastructure
mode)
This is the mode in which communications are performed via the access point.
68
IP address
Internet Protocol (IP) is a protocol for distributing data, and the address
corresponding to the data distribution destination is called the IP address. The
same IP address cannot be used within the same LAN.
67
68
75
LAN
Abbreviation for Local Area Network. This is a network with a relatively narrow
range such as inside a company.
17
MAC address
Each network adapter has its own ID No.
A discrete ID No. is assigned to each and every network adapter around the
world. These IDs are used to exchange data between adapters. These IDs
are a combination of a discrete number managed and assigned by the IEEE to
each individual manufacturer and a unique number assigned to each individual
adapter by the manufacturer.
89