User's Manual

AES-CCMP Advanced Encryption Standard - Counter CBC-MAC Protocol is the new
method for privacy protection of wireless transmissions specified in the
IEEE 802.11i standard. AES-CCMP provides a stronger encryption method
than TKIP. The AES algorithm is capable of using cryptographic keys of
128, 192, and 256 bits to encrypt and decrypt data in 128-bit blocks. AES-
CCMP uses the AES block cipher, but restricts the key length to 128 bits.
AES-CCMP incorporates two sophisticated cryptographic techniques
(counter mode and CBC-MAC) to provide improved security between the
mobile client and the access point.
Authentication Verifies the identity of a user logging onto a network. Passwords, digital
certificates, smart cards and biometrics are used to prove the identity of
the client to the network. Passwords and digital certificates are also used
to identify the network to the client.
Available
network
One of the networks listed under Available networks on the Wireless
Networks tab of the Wireless Network Connection Properties (Windows* XP
environment). Any wireless network that is broadcasting and is within
receiving range of the WiFi adapter appears on the list.
BER Bit Error Rate. The ratio of errors to the total number of bits being sent in
a data transmission from one location to another.
Bit Rate The total number of bits (ones and zeros) per second that a network
connection can support. Note that this bit rate will vary, under software
control, with different signal path conditions.
Broadcast
SSID
Used to allow an access point to respond to clients on a wireless network
by sending probes.
BSSID A unique identifier for each wireless client on a wireless network. The Basic
Service Set Identifier (BSSID) is the Ethernet MAC address of each adapter
on the network.
CA
(Certificate
Authority)
A corporate certification authority implemented on a server. In addition,
Internet Explorer's certificate can import a certificate from a file. A trusted
CA certificate is stored in the root store.
CCX (Cisco
Compatible
eXtension)
Cisco Compatible Extensions Program ensures that devices used on Cisco
wireless LAN infrastructure meet the security, management and roaming
requirements.
Certificate Used for client authentication. A certificate is registered on the
authentication server (for example, RADIUS server) and used by the
authenticator.
CKIP Cisco Key Integrity Protocol (CKIP) is a Cisco proprietary security protocol
for encryption in 802.11 media. CKIP uses a key message integrity check
and message sequence number to improve 802.11 security in
infrastructure mode. CKIP is Cisco's version of TKIP.
Client
computer
The computer that gets its Internet connection by sharing either the host
computer's connection or the access point's connection.