Glossary
Item Descriptions See page
Access point
These are stations for relaying electromagnetic signals between computers
in a wireless LAN. When a computer is connected to an access point, it can
communicate through the network connected to the access point.
86
AES
Next generation standard cryptography standardized by the National
Institute of Standards and Technology (NIST).
AES: Advanced Encryption Standard
87
DEFAULT
GATEWAY
The devices that are used for different network standards from yours.
Default Gateway enables a connection with other network, by adjusting
bilateral differences such as communication protocols. If no gateway is
specied for the IP address of access destination, data will be sent to the
host set as the default gateway.
85
87
DHCP
Abbreviation for Dynamic Host Conguration Protocol. This function
automatically assigns IP addresses to the connected equipment. If a device
with the DHCP server function is present within a LAN, it automatically
assigns IP addresses to the connected equipment.
85
87
EAP
Abbreviation of PPP Extensible Authentication Protocol. An authentication
protocol extended from PPP, which is used for user authentication for remote
access. MD5, TLS, S/Key, etc. are supported as authentication methods.
This protocol is adopted by the wireless LAN authentication standard IEEE
802.1X, and available methods include EAP-TLS/EAP-TTLS/EAP-LEAP/
EAP-PEAP/EAP-MD5.
87
EAP-FAST
Abbreviation of EAP-Flexible Authentication via Secure Tunneling. It is
one of the wireless authentication methods compatible with IEEE 802.1X.
It does not require digital authentication, but establishes a tunnel for the
authentication process using a secret key cryptosystem, and authenticates
the tunnel mutually to improve security. Cisco’s proprietary method.
87
EAP-TTLS
Abbreviation of EAP-Tunneled Transport Layer Security. It is one of the
wireless authentication methods compatible with IEEE 802.1X. It performs
mutual authentication with a digital certicate by the authentication server,
and ID/password by the client. A tunnel is established for the authentication
process. Developed by Func Software in the U.S.
87
GTC
(EAP-GTC)
Abbreviation of EAP-Generic Token Card. It is one of the wireless
authentication methods compatible with IEEE 802.1X. Authentication is
performed with ID and password. Password is acquired from a security
token.
87
IP ADDRESS
Internet Protocol (IP) is a protocol for distributing data, and the address
corresponding to the data distribution destination is called the IP address.
The same IP address cannot be used within the same LAN.
85
86
87
LAN
Abbreviation for Local Area Network. This is a network with a relatively
narrow range such as inside a company.
20
MAC Address
Each network adapter has its own ID No.
A discrete ID No. is assigned to each and every network adapter around the
world. These IDs are used to exchange data between adapters. These IDs
are a combination of a discrete number managed and assigned by the IEEE
to each individual manufacturer and a unique number assigned to each
individual adapter by the manufacturer.
106
136 -
ENGLISH
Chapter 6 Appendix - Glossary