Glossary
file:///C|/Documents%20and%20Settings/dcobb1/Desktop/Holbert%2014.0%20Proset%20User%20Guide/html/glossary.htm[9/24/2010 5:51:51 PM]
Protocol)
TKIP is part of the IEEE 802.11i encryption standard for wireless networks. TKIP is the next
generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless
networks. TKIP provides per packet key mixing, a message integrity check and a re-keying
mechanism, thus fixing the flaws of WEP.
TLS (Transport
Layer Security)
A type of authentication method using the Extensible Authentication Protocol (EAP) and a
security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which use
passwords. EAP-TLS authentication supports dynamic WEP key management. The TLS protocol is
intended to secure and authenticate communications across a public network through data
encryption. The TLS Handshake Protocol allows the server and client to provide mutual
authentication and to negotiate an encryption algorithm and cryptographic keys before data is
transmitted.
TTLS (Tunneled
Transport Layer
Security)
These settings define the protocol and the credentials used to authenticate a user. In TTLS, the
client uses EAP-TLS to validate the server and create a TLS-encrypted channel between the
client and server. The client can use another authentication protocol. Typically password-based
protocols challenge over this encrypted channel to enable server validation. The challenge and
response packets are sent over a non-exposed TLS encrypted channel. TTLS implementations
today support all methods defined by EAP, as well as several older methods (CHAP, PAP, MS-
CHAP and MS-CHAP-V2). TTLS can easily be extended to work with new protocols by defining
new attributes to support new protocols.
WEP (Wired
Equivalent
Privacy)
Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes referred to as 40-bit). This is a
low-level encryption technique designed to give the user about the same amount of privacy that
he would expect from a LAN. WEP is a security protocol for wireless local area networks
(WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security
as that of a wired LAN. WEP aims to provide security by data over radio waves so that it is
protected as it is transmitted from one end point to another.
WEP Key
Either a pass phrase or hexadecimal key.
The pass phrase must be 5 ASCII characters for 64-bit WEP or 13 ASCII characters for 128-bit
WEP. For pass phrases, 0-9, a-z, A-Z, and ~!@#$%^&*()_+|`-={}|[]\:";'<>?,./ are all valid
characters.
The hex key must be 10 hexadecimal characters (0-9, A-F) for 64-bit WEP or 26 hexadecimal
characters (0-9, A-F) for 128-bit WEP.
Wi-Fi*
(Wireless
Fidelity)
Is meant to be used generically when referring of any type to 802.11 network, whether
802.11b, 802.11a, or dual-band.
WiMAX
WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications
technology aimed at providing wireless data over long distances in a variety of ways, from point-
to-point links to full mobile cellular type access. It is based on the IEEE 802.16 standard. The
name WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promote
conformance and interoperability of the standard. The forum describes WiMAX as "a standards-
based technology enabling the delivery of last mile wireless broadband access as an alternative
to cable and DSL."
Wireless router A stand-alone wireless hub that allows any computer that has a wireless network adapter to
communicate with another computer within the same network and to connect to the Internet.
WLAN (Wireless
Local-Area
Network)
A type of local-area network that uses high-frequency radio waves rather than wires to
communicate between nodes.
WPA* (Wi-Fi
Protected
Access)
This is a security enhancement that strongly increases the level of data protection and access
control to a wireless network. WPA is an interim standard that will be replaced with the IEEE's
802.11i standard upon its completion. WPA consists of RC4 and TKIP and provides support for
BSS (Infrastructure) mode only. WPA and WPA2 are compatible.
WPA2* (Wi-Fi
Protected
Access 2)
This is the second generation of WPA that complies with the IEEE TGi specification. WPA2
consists of AES encryption, pre-authentication and PMKID caching. It provides support for BSS
(Infrastructure) mode and IBSS (ad hoc) mode. WPA and WPA2 are compatible.
WPA-Enterprise Wi-Fi Protected Access-Enterprise applies to corporate users. A new standards-based,
interoperable security technology for wireless LAN (subset of IEEE 802.11i draft standard) that
encrypts data sent over radio waves. WPA is a Wi-Fi standard that was designed to improve