P Series.book Page 97 Monday, October 9, 2006 10:58 AM

PEAP (Protected Extensible Authentication Protocol)

An improvement over EAP, making authentication much easier to achieve.

PPPoE (Point to Point Protocol over Ethernet)

A method of allowing the authentication protocol adopted in telephone line connection (PPP) to be used over an Ethernet.

Protocol

A procedure or rule of delivering data among computers. Ordered data communication is allowed by making all conditions required for communication including the method of data transmission/reception and actions upon communication errors into proce- dures.

Shared key authentication

802.11network authentication method in which the AP sends the client device a challenge text packet that the client must then encrypt with the correct WEP key and return to the AP. If the client has the wrong key or no key, authentication will fail and the client will not be allowed to associate with the AP. Shared key authentica- tion is not considered secure, because a hacker who detects both the clear-text challenge and the same chal- lenge encrypted with a WEP key can decipher the WEP key.

SSID (Service Set Identifier)

Service Set Identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because the SSID is broadcast in plain text, it does not supply any security to the network.

Subnet mask

TCP-IP network is controlled by being divided into multiple smaller networks (subnets). IP address consists of the subnet address and the address of each computer. Subnet mask defines how many bits of IP address comprise the subnet address. The same value shall be set among computers communicating with each other.

TCP/IP (Transmission Control Protocol/Internet Protocol)

A standard protocol of the Internet.

W i r e l e s s L A N U s e r ’ s G u i d e

TKIP (Temporal Key Integrity Protocol)

Security feature that is a WEP enhancement to defend against known wireless data security issues.

WEP (Wired Equivalent Privacy)

Standard wireless security provided by the Wi-Fi stan- dard, used for protecting wireless data.

Wi-Fi

Wi-Fi, or Wireless Fidelity, is a set of standards for wire- less local area networks (WLAN) based on the IEEE

802.11specifications. Certified products can use the official Wi-Fi logo, which indicates that the product is interoperable with any other product also showing that logo.

WPA (Wi-Fi Protected Access)

Strong replacement for WEP, providing improved data encryption and user authentication.

97

Page 105
Image 105
Fujitsu P1610 Peap Protected Extensible Authentication Protocol, PPPoE Point to Point Protocol over Ethernet, Subnet mask