Panasonic PT-VW345NZU Projector User Manual


 
Item Descriptions See page
MD5
(EAP-MD5)
Abbreviation of EAP-Message digest algorithm 5. It is one of the wireless
authentication methods compatible with IEEE 802.1X. Authentication is
performed with ID and password. Password is sent encrypted with challenge
& response method.
87
MS-CHAPv2
(EAP-MS-
CHAPv2)
Abbreviation of EAP-Microsoft Challenge Handshake Authentication
Protocol v2. It is one of the wireless authentication methods compatible with
IEEE 802.1X.It performs mutual authentication using a one-way encrypted
password.
87
Open System/
OPEN
This is an authentication of wireless signals employing a public key
encryptosystem.
87
PEAP
Abbreviation for EAP-Protected EAP. It is one of the wireless authentication
methods compatible with IEEE 802.1X. It performs mutual authentication
with a digital certicate by the authentication server, and ID/password by the
client.
87
RADIUS server
RADIUS is an abbreviation of Remote Access Dial In User authentication
Service, and it is a protocol used for authentication in various networks such
as wireless LAN. An authentication server compatible with the protocol is
called a RADIUS server.
The RADIUS server eliminates the need of registering user information
separately in each device even when there are multiple network devices,
and enables integrated management of multiple network devices and users.
87
Shared Key/
SHARED
This is a secret key encryptosystem for wireless signals in which
authentication is performed with a key pre-set in the WEP.
Other terms for this method, in which the same key is used for both
encryption and decryption, are “shared key encryptosystem” and “common
key encryptosystem”.
87
SSID
Abbreviation for Service Set ID. The SSID identication code must be set to
distinguish equipment included in a wireless LAN that uses access points
from equipment not included in that LAN.
This may appear as the “ESSID” or the “network name” for wireless LAN
adapters made by some manufacturers.
86
87
SUBNET MASK
This limits the range of the IP addresses assigned to computers in order to
divide the network into a number of sections during TCP/IP connection. The
value used to divide the network at this time is called the subnetmask.
85
86
87
TKIP
Abbreviation for Temporal Key Integrity Protocol.
This encryption protocol provides even greater security than WEP because
it changes the encryption key at xed intervals.
87
WEP
Abbreviation for Wired Equivalent Privacy. This is a method for encrypting
communication data. The encryption key is created and notied only to the
communicating user, so the communication data cannot be decrypted by a
third party.
87
WPA-EAP
WPA2-EAP
Standard for the encryption method for wireless LAN. This is an encryption
method for corporations, and encryption is performed using the external
server.
87
WPA-PSK
WPA2-PSK
This is a standard covering encryption methods used in wireless LAN.
It provides greater security than WEP, and has functions such as a
user authentication function and also TKIP (encryption protocol) which
automatically changes the encryption key at xed intervals.
And this authentication requires no authentication server.
87
ENGLISH
-
137
Chapter 6 Appendix - Glossary