SIM
Subscriber Identity Module card is used to validate credentials with
the network. A SIM card is a special smart card that is used by
GSM-based digital cellular networks.
Silent Mode
Silent Mode Access Points or Wireless Routers have been
configured to not broadcast the SSID for the wireless network. This
makes it necessary to know the SSID in order to configure the
wireless profile to connect to the access point or wireless router.
Single Sign On Single Sign On feature set allows the 802.1x credentials to match
your Windows log on user name and password credentials for
wireless network connections.
SSID
Service Set Identifier. SSID or network name is a value that
controls access to a wireless network. The SSID for your wireless
network card must match the SSID for any access point that you
want to connect with. If the value does not match, you are not
granted access to the network. Each SSID may be up to 32
alphanumeric characters long and is case-sensitive.
Stealth
A stealth access point is one that has the capability and is
configured to not broadcast its SSID. This is the wireless network
name that appears when a DMU (Device Management Utility, such
as Intel® PROSet/Wireless) scans for available wireless networks.
It is commonly considered a weak security feature, in that it does
not readily disclose the presence of the wireless network. To
connect to a stealth access point, a user must specifically know the
SSID and configure their DMU accordingly. The feature is not a
part of the 802.11 specification, and is known by differing names
by various vendors: closed mode, private network, SSID
broadcasting.
TKIP
Temporal Key Integrity protocol improves data encryption. Wi-Fi
Protected Access utilizes its TKIP. TKIP provides important data
encryption enhancements including a re-keying method. TKIP is
part of the IEEE 802.11i encryption standard for wireless networks.
TKIP is the next generation of WEP, the Wired Equivalency
Protocol, which is used to secure 802.11 wireless networks. TKIP
provides per-packet key mixing, a message integrity check and a
re-keying mechanism, thus fixing the flaws of WEP.
TLS
Transport Layer Security. A type of authentication method using
the Extensible Authentication Protocol (EAP) and a security
protocol called the Transport Layer Security (TLS). EAP-TLS uses
certificates which use passwords. EAP-TLS authentication supports
dynamic WEP key management. The TLS protocol is intended to
secure and authenticate communications across a public network
through data encryption. The TLS Handshake Protocol allows the
server and client to provide mutual authentication and to negotiate
an encryption algorithm and cryptographic keys before data is
transmitted.
Summary of Contents for Wireless WiFi Link 4965AGN
Page 31: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 36: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 144: ...Back to Contents Trademarks and Disclaimers ...
Page 152: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 174: ......
Page 175: ......
Page 183: ......