Product Info

specification, and is known by differing names by various vendors: closed mode, private
network, SSID broadcasting.
TKIP (Temporal
Key Integrity
Protocol)
Temporal Key Integrity protocol improves data encryption. Wi-Fi Protected Access* uses its
TKIP. TKIP provides important data encryption enhancements including a re-keying method.
TKIP is part of the IEEE 802.11i encryption standard for wireless networks. TKIP is the next
generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless
networks. TKIP provides per packet key mixing, a message integrity check and a re-keying
mechanism, thus fixing the flaws of WEP.
TLS (Transport
Layer Security)
A type of authentication method using the Extensible Authentication Protocol (EAP) and a
security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which
use passwords. EAP-TLS authentication supports dynamic WEP key management. The TLS
protocol is intended to secure and authenticate communications across a public network
through data encryption. The TLS Handshake Protocol allows the server and client to provide
mutual authentication and to negotiate an encryption algorithm and cryptographic keys
before data is transmitted.
TTLS (Tunneled
Transport Layer
Security)
These settings define the protocol and the credentials used to authenticate a user. In TTLS,
the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between
the client and server. The client can use another authentication protocol. Typically password-
based protocols challenge over this encrypted channel to enable server validation. The
challenge and response packets are sent over a non-exposed TLS encrypted channel. TTLS
implementations today support all methods defined by EAP, as well as several older methods
(CHAP, PAP, MS-CHAP and MS-CHAP-V2). TTLS can easily be extended to work with new
protocols by defining new attributes to support new protocols.
WEP (Wired
Equivalent
Privacy)
Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes referred to as 40-bit). This is
a low-level encryption technique designed to give the user about the same amount of
privacy that he would expect from a LAN. WEP is a security protocol for wireless local area
networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same
level of security as that of a wired LAN. WEP aims to provide security by data over radio
waves so that it is protected as it is transmitted from one end point to another.
WEP Key Either a pass phrase or hexadecimal key.
The pass phrase must be 5 ASCII characters for 64-bit WEP or 13 ASCII characters for 128-
bit WEP. For pass phrases, 0-9, a-z, A-Z, and ~!@#$%^&*()_+|`-={}|[]\:";'<>?,./ are all
valid characters.
The hex key must be 10 hexadecimal characters (0-9, A-F) for 64-bit WEP or 26
hexadecimal characters (0-9, A-F) for 128-bit WEP.
Wi-Fi*
(Wireless
Fidelity)
Is meant to be used generically when referring of any type to 802.11 network, whether
802.11b, 802.11a, or dual-band.
WiMAX WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications
technology aimed at providing wireless data over long distances in a variety of ways, from
point-to-point links to full mobile cellular type access. It is based on the IEEE 802.16
standard. The name WiMAX was created by the WiMAX Forum, which was formed in June
2001 to promote conformance and interoperability of the standard. The forum describes
WiMAX as "a standards-based technology enabling the delivery of last mile wireless
broadband access as an alternative to cable and DSL."
Wireless router A stand-alone wireless hub that allows any computer that has a wireless network adapter to
communicate with another computer within the same network and to connect to the
Internet.
WLAN (Wireless
Local-Area
Network)
A type of local-area network that uses high-frequency radio waves rather than wires to
communicate between nodes.
WPA* (Wi-Fi
Protected
Access)
This is a security enhancement that strongly increases the level of data protection and
access control to a wireless network. WPA is an interim standard that will be replaced with
the IEEE's 802.11i standard upon its completion. WPA consists of RC4 and TKIP and provides
support for BSS (Infrastructure) mode only. WPA and WPA2 are compatible.
WPA2* (Wi-Fi This is the second generation of WPA that complies with the IEEE TGi specification. WPA2