User guide

HiPath Wireless Standalone 802.11n AP User Guide D-7
IPsec
IPsec-ESP
IPsec-AH
Internet Protocol security (IPSec)
Internet Protocol security Encapsulating Security Payload (IPsec-
ESP). The encapsulating security payload (ESP) encapsulates its
data, enabling it to protect data that follows in the
datagram.Internet Protocol security Authentication Header (IPsec-
AH). AH protects the parts of the IP datagram that can be
predicted by the sender as it will be received by the receiver.IPsec
is a set of protocols developed by the IETF to support secure
exchange of packets at the IP layer. IPsec has been deployed
widely to implement Virtual Private Networks (VPNs). IPsec
supports two encryption modes: Transport and Tunnel. Transport
mode encrypts only the data portion (payload) of each packet, but
leaves the header untouched. The more secure Tunnel mode
encrypts both the header and the payload. On the receiving side,
an IPSec-compliant device decrypts each packet. For IPsec to
work, the sending and receiving devices must share a public key.
This is accomplished through a protocol known as Internet
Security Association and Key Management Protocol/Oakley
(ISAKMP/Oakley), which allows the receiver to obtain a public key
and authenticate the sender using digital certificates.
isochronous Isochronous data is data (such as voice or video) that requires a
constant transmission rate, where data must be delivered within
certain time constraints. For example, multimedia streams require
an isochronous transport mechanism to ensure that data is
delivered as fast as it is displayed and to ensure that the audio is
synchronized with the video. Compare: asynchronous processes
in which data streams can be broken by random intervals, and
synchronous processes, in which data streams can be delivered
only at specific intervals.
ISP Internet Service Provider.
IV IV (Initialization Vector), part of the standard WEP encryption
mechanism that concatenates a shared secret key with a
randomly generated 24-bit initialization vector. WPA with TKIP
uses 48-bit IVs, an enhancement that significantly increases the
difficulty in cracking the encryption. (See WPA and TKIP)
LAN Local Area Network.
License installation
LSA Link State Advertisements received by the currently running OSPF
process. The LSAs describe the local state of a router or network,
including the state of the router's interfaces and adjacencies. See
also OSPF.
MAC Media Access Control layer. One of two sublayers that make up
the Data Link Layer of the OSI model. The MAC layer is
responsible for moving data packets to and from one Network
Interface Card (NIC) to another across a shared channel.
MAC address Media Access Control address. A hardware address that uniquely
identifies each node of a network.
Term Definition