User's Manual

Service Set Identifier (SSID)
Name of a WLAN. All wireless devices on a WLAN must use the same SSID to communicate with
each other.
Simple Network Management Protocol (SNMP)
An Internet-standard protocol for managing devices on IP networks.
Snooping
Passively watching a network for data, such as passwords, that can be used to benefit a hacker.
Temporal Key Integrity Protocol (TKIP)
An encryption protocol that uses 128-bit keys. Keys are dynamically generated and distributed by
the authentication server. TKIP regularly changes and rotates encryption keys, with an encryption
key never being used twice.
Transmission Control Protocol/Internet Protocol (TCP/IP)
A protocol that allows communications over and between networks. TCP/IP is the basis for
Internet communications.
Weighted Fair Queuing (WFQ)
WFQ services queues are based on priority and queue weight. Queues with larger weights get
more service than queues with smaller weights. This highly efficient queuing mechanism divides
available bandwidth across different traffic queues.
Wired Equivalent Privacy (WEP)
Security protocol that provides a WLAN with a level of security and privacy comparable to that of
a wired LAN. WEP encrypts data sent between wired and WLANs to keep transmissions private.
Wireless Local-Area Network (WLAN)
WLANs use RF technology to send and receive data wirelessly in a certain area. This lets users in a
small zone send data and share resources such as printers without using cables to physically
connect each computer.
Wi-Fi Protected Access (WPA )
A subset of the IEEE 802.11i standard. WPA applies IEEE 802.1x and Extensible Authentication
Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA uses
Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC), and IEEE 802.1x to encrypt
data. See also WPA-PSK (WPA -Pre-Shared Key).
Wi-Fi MultiMedia (WMM)
Part of the IEEE 802.11e QoS enhancement to the Wi-Fi standard that ensures quality of service
for multimedia applications in WLANs.
Wireless Client Supplicants
Software that runs on an operating system, instructing the wireless client how to use WPA.
WPA -Pre-Shared Key (WPA-PSK)
WPA-PSK requires a single (identical) password entered into each Access Point, wireless gateway,
and wireless client. A client is granted access to a WLAN if the passwords match.
WPA2
A wireless security standard that defines stronger encryption, authentication, and key
management than WPA. It includes two data encryption algorithms, Temporal Key Integrity