Specifications
11
TSP
TOE Security Policy
Wi-Fi
Wireless Fidelity
WIDS
Wireless Intrusion Detection System
wIPS
Wireless Intrusion Prevention System
WiSM
Wireless Services Module
WLAN
Wireless LAN
WLC
Cisco Wireless LAN Controller
WCS
Cisco Wireless Control System
WPA2
Wi-Fi Protected Access 2
The following terms are used in this Security Target:
Table 2 Terms & Definitions
Terms
Definitions
802.1X
The IEEE 802.1X standard provides a framework for many
authentication types and the link layer.
AAA Client
Provides authentication, authorization and accounting. Also known as a
NAS
ACS/ISE
Host
The IT Environment that includes the hardware and operating system
that hosts the ACS and/or ISE software.
CARS
The Operating System that runs on the ACS Host is a CentOS Linux
distribution operating system, as configured for use by the ACS
software.
EAP
Stands for the extensible authentication protocol (EAP). EAP is a
protocol that supports the communication of other authentication
protocols. EAP uses its own start and end messages which allows it to
then support any number of third-party messages between supplicants
and an authentication server.
EAP-FAST
Stands for EAP-flexible authentication secure tunneling (EAP-FAST).
This method provides an encrypted tunnel to distribute pre-shared keys
known as protected access credential (PAC) keys.
EAP-GTC
EAP-GTC (Generic Token Card), which is described in RFC 2284, is
used for authenticating token card credentials across the network. EAP-
GTC is typically used inside a TLS tunnel created by TTLS or PEAP to
provide server authentication in wireless environments.