User's Manual

Table Of Contents
4/1/05
OL-7426-02
USB
A high-speed bidirectional serial connection between a PC and a peripheral that transmits data at the
rate of 12 megabits per second. The new USB 2.0 specification provides a data rate of up to 480 Mbps,
compared to standard USB at only 12 Mbps. 1394, FireWire and iLink all provide a bandwidth of up to
400 Mbps.
VLAN
Virtual LAN. A networking mechanism that makes clients appear as if they are connected to the same
network, even if they are physically located on different LAN segments. Cisco SWAN recommends that
you assign one set of VLANs for WLANs and a different set of VLANs for Controller Mobility Groups to
ensure that Cisco Wireless LAN Controllers properly route VLAN traffic.
VoIP
Voice transmission using Internet Protocol to create digital packets distributed over the Internet. VoIP
can be less expensive than voice transmission using standard analog packets over POTS (Plain Old
Telephone Service).
Volatile RAM
Volatile Random Access Memory. The basic form of computer memory, which can be accessed
randomly. In the Cisco SWAN products, the Volatile RAM contains the active settings for current opera-
tions. Upon reboot, the Volatile RAM is cleared, and the configurations stored in the NVRAM are copied
into the Volatile RAM. (See also NVRAM.)
VPN
A type of technology designed to increase the security of information transferred over the Internet. VPN
can work with either wired or wireless networks, as well as with dial-up connections over POTS. VPN
creates a private encrypted tunnel from the end user's computer, through the local wireless network,
through the Internet, all the way to the corporate servers and database.
WAN
A communication system of connecting PCs and other computing devices across a large local, regional,
national or international geographic area. Also used to distinguish between phone-based data networks
and Wi-Fi. Telephone networks are considered WANs and Wi-Fi networks are considered Wireless Local
Area Networks (WLANs).
War Chalking
Marking symbols on sidewalks and walls to indicate nearby APs. This allows other 802.11-equipped
clients to connect to the Internet using other peoples’ APs. This practice was inspired by hobos during
the Great Depression who used chalk marks to indicate friendly homes.
WebAuth
Web Authentication. An application-layer authentication of a user by username and password contained
in either a local or RADIUS database.
WECA
Wireless Ethernet Compatibility Alliance, the former name of the Wi-Fi Alliance.
WEP
Wired Equivalent Privacy. Basic wireless security provided by Wi-Fi. In some instances, WEP may be all
a home or small-business user needs to protect wireless data. Cisco SWAN equipment supports the
following WEP versions:
• 40-bit, also called 64-bit encryption.