User's Manual

commonly considered a weak security feature. To connect to a
stealth access point, a user must specifically know the SSID and
configure their DMU accordingly. The feature is not a part of the
802.11 specification, and is known by differing names by various
vendors: closed mode, private network, SSID broadcasting.
TKIP (Temporal Key
Integrity Protocol)
Temporal Key Integrity protocol improves data encryption. Wi-Fi
Protected Access* uses its TKIP. TKIP provides important data
encryption enhancements including a re-keying method. TKIP is part
of the IEEE 802.11i encryption standard for wireless networks. TKIP
is the next generation of WEP, the Wired Equivalency Protocol, which
is used to secure 802.11 wireless networks. TKIP provides per
packet key mixing, a message integrity check and a re-keying
mechanism, thus fixing the flaws of WEP.
TLS (Transport Layer
Security)
A type of authentication method using the Extensible Authentication
Protocol (EAP) and a security protocol called the Transport Layer
Security (TLS). EAP-TLS uses certificates which use passwords. EAP-
TLS authentication supports dynamic WEP key management. The
TLS protocol is intended to secure and authenticate communications
across a public network through data encryption. The TLS Handshake
Protocol allows the server and client to provide mutual
authentication and to negotiate an encryption algorithm and
cryptographic keys before data is transmitted.
TTLS (Tunneled
Transport Layer
Security)
These settings define the protocol and the credentials used to
authenticate a user. In TTLS, the client uses EAP-TLS to validate the
server and create a TLS-encrypted channel between the client and
server. The client can use another authentication protocol. Typically
password-based protocols challenge over this encrypted channel to
enable server validation. The challenge and response packets are
sent over a non-exposed TLS encrypted channel. TTLS
implementations today support all methods defined by EAP, as well
as several older methods (CHAP, PAP, MS-CHAP and MS-CHAP-V2).
TTLS can easily be extended to work with new protocols by defining
new attributes to support new protocols.
WEP (Wired
Equivalent Privacy)
Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes
referred to as 40-bit). This is a low-level encryption technique
designed to give the user about the same amount of privacy that he
would expect from a LAN. WEP is a security protocol for wireless
local area networks (WLANs) defined in the 802.11b standard. WEP
is designed to provide the same level of security as that of a wired
LAN. WEP aims to provide security by data over radio waves so that
it is protected as it is transmitted from one end point to another.
WEP Key
Either a pass phrase or hexadecimal key.
The pass phrase must be 5 ASCII characters for 64-bit WEP or 13
ASCII characters for 128-bit WEP. For pass phrases, 0-9, a-z, A-Z,
and ~!@#$%^&*()_+|`-={}|[]\:";'<>?,./ are all valid characters.
The hex key must be 10 hexadecimal characters (0-9, A-F) for 64-bit
WEP or 26 hexadecimal characters (0-9, A-F) for 128-bit WEP.
Wi-Fi* (Wireless
Fidelity)
Is meant to be used generically when referring of any type to 802.11
network, whether 802.11b, 802.11a, or dual-band.
WiMAX
WiMAX, the Worldwide Interoperability for Microwave Access, is a