User`s manual
436
DWS-1008 User’s Manual
D-Link Systems, Inc.
Appendix D - Glossary
TTLS
Tunneled Transport Layer Security. An Extensible Authentication Protocol (EAP) method
developed by Funk Software, Inc., and Certicom for 802.1X authentication. TTLS uses a
combination of certicates and password challenge and response for authentication. The
entire EAP subprotocol exchange of attribute-value pairs takes place inside an encrypted
transport layer security (TLS) tunnel. TTLS supports authentication methods dened by
EAP, as well as the older Challenge Handshake Authentication Protocol (CHAP), Password
Authentication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2. Compare
EAPTLS; PEAP.
Trapeze Access Point Access protocol
See TAPA™.
Tunneled Transport Layer Security subprotocol
See TTLS.
tunneling
The transmission of data by one network through the connections of another network by
encapsulating its data and protocol information within the other network’s transmission
units. To forward trafc for a roaming user, a DWS-1008 switch that is not a member of the
user’s virtual LAN (VLAN) creates a tunnel to another switch on which the user’s VLAN is
congured.
type, length, and value
See TLV.
U-NII
Unlicensed National Information Infrastructure. Three unlicensed frequency bands of 100 MHz
each in the 5 GHz band, designated by the U.S. Federal Communications Commission
(FCC) to provide highspeed wireless networking. The three frequency bands—5.15 GHz
through 5.25 GHz (for indoor use only), 5.25 GHz through 5.35 GHz, and 5.725 GHz through
5.825 GHz—were allocated in 1997.
Unlicensed National Information Infrastructure
See U-NII.
user
A person who uses a client. In a D-Link network, users are indexed by username and
associated with authorization attributes such as user group membership.