822 Appendix F:Glossary
NN47250-500 (Version 03.01)
restricted access Permission to use most WLAN Security Switch 2300 Series (WSS Software)
command-line interface (CLI) commands required for viewing status information (show commands), except
those that list security information in clear text. Users with restricted access can clear ARP requests and ping
hosts. Compare enabled access.
RF detection sweep A comprehensive search for radio frequency (RF) signals within a Mobility
Domain™ group, to locate rogue clients, rogue access points, and ad hoc users. A sweep can be either a
scheduled sweep or a continuous SentrySweep™ search. During a scheduled sweep, each included Access
Point (AP) radio sweeps all channels in the IEEE 802.11b/g and 802.11a spectrum. In contrast, SentrySweep
operates only on the disabled radios in a Mobility Domain and does not disrupt service.
WLAN Management Software™ A tool suite for planning, configuring, deploying, and managing
a Nortel WLAN 2300 system wireless LAN (WLAN). Based on site and user requirements, WLAN
Management Software determines the location of WLAN—Security Switches (WSSs) and Access Point (AP)
and can store and verify configuration information before installation. After installation, WLAN Management
Software deploys the settings on the equipment and manages and verifies configuration changes. To monitor
network performance, WLAN Management Software collects WSS and AP information, calculates and
displays AP neighbor relationships, and detects anomalous events—for example, rogue access points.
roaming The ability of a wireless user (client) to maintain network access when moving between APs.
robust security network See RSN.
rogue access point An AP that is not authorized to operate within a wireless network. Rogue access
points subvert the security of an enterprise network by allowing potentially unchallenged access to the
enterprise network by any wireless user (client) in the physical vicinity.
rogue client A user (client) who is not recognized within a network, but who gains access to it by
intercepting and modifying transmissions to circumvent the normal authorization and authentication
processes.
RSA A public-key algorithm developed in 1977 by RSA Data Security, Inc., used for encryption, digital
signatures, and key exchange.
RSN Robust security network. A secure wireless LAN (WLAN) based on the developing IEEE 802.11i
standard.
RSSI Received signal strength indication. The received strength of an incoming radio frequency (RF) signal,
typically measured in decibels referred to 1 milliwatt (dBm).
scalability The ability to adapt easily to increased or decreased requirements without impairing
performance.
secure hashing algorithm See SHA.
Secure Shell protocol See SSH.
Secure Sockets Layer protocol See SSL.