Owner's Manual

and listens for the Probe-Response frames sent by wireless router/APs and other wireless clients.
single sign-on
A process that allows a user with a domain account to log on to a network once, using a password or smart card, and
to gain access to any computer in the domain.
smart card
Smart cards are small portable credit-card shaped devices with internal integrated circuits (ICs). The combination of
the small size and IC make them valuable tools for security, data storage, and special applications. The use of smart
cards can improve user security by combining something a user has (the smart card) with something only the user
should know (a PIN) to provide two-factor security that is more secure than passwords alone.
service set identifier (SSID)
A value that controls access to a wireless network. The SSID for your DW WLAN Card must match the SSID for any
access point (AP) that you want to connect with. If the value does not match, you are not granted access to the
network. You can have up to three SSIDs. Each SSID can be up to 32 characters long and is case-sensitive. Also
referred to as the network name.
station (STA)
A computer that is equipped with a DW WLAN Card (see also
wireless client). A station can be stationary or mobile.
Temporal Key Integrity Protocol (TKIP)
An enhanced wireless security protocol that is part of the
IEEE 802.11i encryption standard for wireless LANs. TKIP
provides per-packet key mixing, a message integrity check (MIC), and a rekeying mechanism.
Transport Layer Security (TLS)
The successor to Secure Sockets Layer (SSL) protocol for ensuring privacy and data integrity between two
communicating applications.
Trusted Platform Module (TPM)
A security hardware device on the system board that holds computer-generated keys for encryption. It is a hardware
based solution that can help avoid attacks by hackers looking to capture passwords and encryption keys to sensitive
data.
The security features provided by the TPM are internally supported by the following cryptographic capabilities of each
TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. Each
individual TPM on each individual computer system has a unique signature initialized during the silicon manufacturing
process that further enhances its trust/security effectiveness. Each individual TPM must have an owner before it is
useful as a security device.
Tunneled Transport Layer Security (TTLS)
These settings define the protocol and the credentials used to authenticate a user. In TTLS, the client uses EAP-TLS to
validate the server and create a TLS-encrypted channel between the client and server. The client can use another
authentication protocol (typically password-based protocols, such as MD5 Challenge) over this encrypted channel to
enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel.
Unscheduled Automatic Power Save Delivery (UAPASD)
An enhanced Power Save mode for
IEEE 802.11e networks.
Wake on Wireless LAN (WoWLAN)
A feature that allows a computer to be awakened from a sleep state by the arrival of a specific packet over the
network. See
Wake-Up Mode for a description of the property settings that affect the functionality of this feature.
Wired Equivalent Privacy (WEP)
A form of data encryption. WEP is defined by the IEEE 802.11 standard and is intended to provide a level of data
confidentiality and integrity that is equivalent to a wired network. Wireless networks that use WEP are more vulnerable
to various types of attacks than those that use WPA.
wireless client
A personal computer equipped with a wireless network adapter such as a DW WLAN Card.