User's Manual
Table Of Contents
- Compliances
- About This Guide
- Contents
- Figures
- Tables
- Index of CLI Commands
- Getting Started
- Introduction
- Network Topologies
- Installing the access point
- Initial Configuration
- Web Configuration
- System Settings
- Management Settings
- Advanced Settings
- Wireless Settings
- Maintenance Settings
- Status Information
- Command Line Interface
- Using the Command Line Interface
- General Commands
- System Management Commands
- System Logging Commands
- System Clock Commands
- DHCP Relay Commands
- SNMP Commands
- Flash/File Commands
- RADIUS Client Commands
- 802.1X Authentication Commands
- MAC Address Authentication Commands
- Filtering Commands
- Spanning Tree Commands
- WDS Bridge Commands
- Ethernet Interface Commands
- Wireless Interface Commands
- Wireless Security Commands
- Link Layer Discovery Commands
- VLAN Commands
- WMM Commands
- Appendices
- Troubleshooting
- Hardware Specifications
- Cables and Pinouts
- Glossary
- Index
G
LOSSARY
– 255 –
TEMPORAL KEY
INTEGRITY PROTOCOL
(TKIP)
A data encryption method designed as a replacement for WEP. TKIP avoids
the problems of WEP static keys by dynamically changing data encryption
keys.
TRIVIAL FILE TRANSFER
PROTOCOL (TFTP)
A TCP/IP protocol commonly used for software downloads.
VIRTUAL ACCESS POINT
(VAP)
Virtual AP technology multiplies the number of Access Points present within
the RF footprint of a single physical access device. With Virtual AP
technology, WLAN users within the device.s footprint can associate with
what appears to be different access points and their associated network
services. All the services are delivered using a single radio channel,
enabling Virtual AP technology to optimize the use of limited WLAN radio
spectrum.
WI-FI PROTECTED
ACCESS
WPA employs 802.1X as its basic framework for user authentication and
dynamic key management to provide an enhanced security solution for
802.11 wireless networks.
WIRED EQUIVALENT
PRIVACY (WEP)
WEP is based on the use of security keys and the popular RC4 encryption
algorithm. Wireless devices without a valid WEP key will be excluded from
network traffic.
WPA PRE-SHARED KEY
(WPA-PSK)
WPA-PSK can be used for small office networks with a limited number of
users that may not need a high level of security. WPA-PSK provides a
simple security implementation that uses just a pre-shared password for
network access.