Glossary
A31003-W1040-U101-1-7619, July 2006 DRAFT
288
HiPath Wireless Controller, Access Points and Convergence Software V4.0, C10/C100/C1000 User Guide
hwc_glossary.fm
Controller, Access Points and Convergence Software terms and abbreviations
13.2
Controller, Access Points and Convergence Software terms and
abbreviations
WPA
Wireless Protected Access, or Wi-Fi Protected Access is a security
solution adopted by the Wi-Fi Alliance that adds authentication to
WEPs’ basic encryption. For authentication, WPA specifies IEEE
802.1x authentication with Extensible Authentication Protocol (EAP).
For encryption, WPA uses the Temporal Key Integrity Protocol (TKIP)
mechanism, which shares a starting key between devices, and then
changes their encryption key for every packet. Certificate
Authentication (CA) can also be used. Also part of the encryption
mechanism are 802.1X for dynamic key distribution and Message
Integrity Check (MIC) a.k.a. Michael.
WPA requires that all computers and devices have WPA software.
WPA-PSK
Wi-Fi Protected Access with Pre-Shared Key, a special mode of WPA
for users without an enterprise authentication server. Instead, for
authentication, a Pre-Shared Key is used. The PSK is a shared secret
(passphrase) that must be entered in both the wireless access point or
router and the WPA clients.
This preshared key should be a random sequence of characters at
least 20 characters long or hexadecimal digits (numbers 0-9 and
letters A-F) at least 24 hexadecimal digits long. After the initial shared
secret, the Temporal Key Integrity Protocol (TKIP) handles the
encryption and automatic rekeying.
Term
Explanation
CTP
CAPWAP Tunnelling Protocol (CTP). The Wireless AP uses a UDP
(User Datagram Protocol) based tunnelling protocol called CAPWAP
Tunnelling Protocol (CTP) to encapsulate the 802.11 packets and
forward them to the HiPath Wireless Controller.
The CTP protocol defines a mechanism for the control and
provisioning of wireless access points (CAPWAP) through centralized
access controllers. In addition, it provides a mechanism providing the
option to tunnel the mobile client data between the access point and
the access controller.
Table 20
Term
Explanation
Table 19