User's Manual

USER GUIDE
RA: registration authority. Network software that verifies a user (client) request for a digital
certificate and instructs the certificate authority (CA) to issue the certificate. Registration
authorities are part of a public-key infrastructure (PKI), which enables secure exchanges of
information over a network. The digital certificate contains a public key for encrypting and
decrypting messages and digital signatures.
roaming: The ability of a user (client) to maintain network access when moving between access
points (APs).
rogue AP: An access aoint (AP) that is not authorized to operate within a wireless network.
Rogue APs subvert security of an enterprise network by allowing potentially unchallenged access
to the network resources by any wireless user in the physical vicinity.
rogue client: A user who is not recognized within a network, but who gains access to it by
intercepting and modifying transmissions to circumvent the normal authorization and
authentication processes.
RSN: robust security network. A secure wireless LAN (WLAN) based on the developing IEEE
802.11i standard.
SSH: secure shell. A Telnet-like protocol that establishes an encrypted session.
shared secret: A static key distributed by an out-of-band mechanism to both the sender and
receiver. Also known as a shared key or pre-shared key (PSK), a shared secret is used as input to
a one-way hash algorithm. When a shared secret is used for authentication and the hash output
of both the sender and the receiver match, they share the same secret and are authenticated. A
shared secret can also be used to generate encryption key.
spread spectrum: A modulation technique that spreads a signal’s power over a wide band of
frequencies. The main reason for the technique is that the signal is much less susceptible to
electrical noise and interferences then other techniques.
SSID: service set identifier. The unique name shared among all devices in a wireless LAN
(WLAN).
station: In IEEE 802.11 networks, any device that contains an IEEE 802.11-compliant media
access control and physical layers.
supplicant: A wireless client that is requesting access to a network.
Telnet: A virtual terminal protocol. Enables users to login to a remote host.
TKIP: temporal key integrity protocol. A wireless encryption protocol that fixes the known
problems in the Wired-Equivalent Privacy (WEP) protocol for existing 802.11 products. Like
WEP, TKIP uses RC4 ciphering, but adds functions such as a 128-bit encryption key, a 48-bit
initialization vector, a new message integrity code (MIC), and initialization vector (IV)
sequencing rules to provide better protection.
70