628Glossary

subnet mobility The ability of a wireless user (client) to roam across Access Point (AP) access ports and WLAN—Security Switch (WSS) switches in a virtual LAN (VLAN) while maintaining a single IP address and associated data sessions.

supplicant A client that is attempting to access a network.

syslog server A remote repository for log messages. Nortel WLAN 2300 System Software (WSS Software) supports up to four syslog servers on virtual LANs (VLANs) whose locations are configurable. WSS Software log protocol complies with RFC 3164.

TAPA™ Nortel access point Access™ protocol. A point-to-point datagram protocol, developed by Nortel , that defines the way each Access Point (AP) access point communicates with a WLAN—Security Switch (WSS) switch in a Nortel WLAN 2300 System. By means of TAPA, AP access ports announce their presence to the WSS, accept configuration from it, relay traffic to and from it, announce the arrival and departure of users (clients), and provide statistics to the WSS on command.

Temporal Key Integrity Protocol See TKIP.

TKIP Temporal Key Integrity Protocol. A wireless encryption protocol that fixes the known problems in the Wired-Equivalent Privacy (WEP) protocol for existing IEEE 802.11 products. Like WEP, TKIP uses RC4 ciphering, but adds functions such as a 128-bit encryption key, a 48-bit initialization vector, a new message integrity code (MIC), and initialization vector (IV) sequencing rules to provide better protection. See also 802.11i; CCMP.

TLS Transport Layer Security protocol. An authentication and encryption protocol that is the successor to the Secure Sockets Layer (SSL) protocol for private transmission over the Internet. Defined in RFC 2246, TLS provides mutual authentication with nonrepudiation, encryption, algorithm negotiation, secure key derivation, and message integrity checking. TLS has been adapted for use in wireless LANs (WLANs) and is used widely in IEEE 802.1X authentication. See also EAP-TLS; PEAP; TTLS.

TLV Type, length, and value. A methodology for coding parameters within a frame. Type indicates a parameter’s type, length indicates the length of its value, and value indicates the parameter’s value.

Transport Layer Security protocol See TLS.

TTLS Tunneled Transport Layer Security. An Extensible Authentication Protocol (EAP) method developed by Funk Software, Inc., and Certicom for 802.1X authentication. TTLS uses a combination of certificates and password challenge and response for authentication. The entire EAP subprotocol exchange of attribute-value pairs takes place inside an encrypted transport layer security (TLS) tunnel. TTLS supports authentication methods defined by EAP, as well as the older Challenge Handshake Authentication Protocol (CHAP), Password Authentication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2. Compare EAP-TLS; PEAP.

Nortel access point Access protocol See TAPA™.

Tunneled Transport Layer Security subprotocol See TTLS.

tunneling The transmission of data by one network through the connections of another network by encapsulating its data and protocol information within the other network’s transmission units. To forward traffic for a roaming user within a Mobility Domain™ group, a WLAN—Security Switch (WSS) switch that is not a member of the user’s virtual LAN (VLAN) creates a tunnel to another WSS switch on which the user’s VLAN is configured.

320657-A

Page 628
Image 628
Nortel Networks 2300 manual Temporal Key Integrity Protocol See Tkip