824 Appendix F:Glossary
NN47250-500 (Version 03.01)
subnet mobility The ability of a wireless user (client) to roam across Access Point (AP) and
WLAN—Security Switch (WSS) switches in a virtual LAN (VLAN) while maintaining a single IP address
and associated data sessions.
supplicant A client that is attempting to access a network.
syslog server A remote repository for log messages. Nortel WLAN Security Switch 2300 Series (WSS
Software) supports up to four syslog servers on virtual LANs (VLANs) whose locations are configurable.
WSS Software log protocol complies with RFC 3164.
Temporal Key Integrity Protocol See TKIP.
TKIP Temporal Key Integrity Protocol. A wireless encryption protocol that fixes the known problems in the
Wired-Equivalent Privacy (WEP) protocol for existing IEEE 802.11 products. Like WEP, TKIP uses RC4
ciphering, but adds functions such as a 128-bit encryption key, a 48-bit initialization vector, a new message
integrity code (MIC), and initialization vector (IV) sequencing rules to provide better protection. See also
802.11i; CCMP.
TLS Transport Layer Security protocol. An authentication and encryption protocol that is the successor to
the Secure Sockets Layer (SSL) protocol for private transmission over the Internet. Defined in RFC 2246, TLS
provides mutual authentication with nonrepudiation, encryption, algorithm negotiation, secure key derivation,
and message integrity checking. TLS has been adapted for use in wireless LANs (WLANs) and is used widely
in IEEE 802.1X authentication. See also EAP-TLS; PEAP; TTLS.
TLV Type, length, and value. A methodology for coding parameters within a frame. Type indicates a
parameter’s type, length indicates the length of its value, and value indicates the parameter’s value.
Transport Layer Security protocol See TLS.
TTLS Tunneled Transport Layer Security. An Extensible Authentication Protocol (EAP) method developed
by Funk Software, Inc., and Certicom for 802.1X authentication. TTLS uses a combination of certificates and
password challenge and response for authentication. The entire EAP subprotocol exchange of attribute-value
pairs takes place inside an encrypted transport layer security (TLS) tunnel. TTLS supports authentication
methods defined by EAP, as well as the older Challenge Handshake Authentication Protocol (CHAP),
Password Authentication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2. Compare
EAP-TLS; PEAP.
Tunneled Transport Layer Security subprotocol See TTLS.
tunneling The transmission of data by one network through the connections of another network by
encapsulating its data and protocol information within the other network’s transmission units. To forward
traffic for a roaming user within a Mobility Domain™ group, a WLAN—Security Switch (WSS) that is not a
member of the user’s virtual LAN (VLAN) creates a tunnel to another WSS on which the user’s VLAN is
configured.
type, length, and value See TLV.
U-NII Unlicensed National Information Infrastructure. Three unlicensed frequency bands of 100 MHz each
in the 5 GHz band, designated by the U.S. Federal Communications Commission (FCC) to provide high-speed
wireless networking. The three frequency bands—5.15 GHz through 5.25 GHz (for indoor use only),
5.25 GHz through 5.35 GHz, and 5.725 GHz through 5.825 GHz—were allocated in 1997.
Unlicensed National Information Infrastructure See U-NII.