User's Guide

CKIP
Cisco Key Integrity Protocol (CKIP) is a Cisco proprietary security
protocol for encryption in 802.11 media. CKIP uses a key message
integrity check and message sequence number to improve 802.11
security in infrastructure mode. CKIP is Cisco's version of TKIP.
Client
computer
The computer that gets its Internet connection by sharing either the host
computer's connection or the access point's connection.
DSSS Direct Sequence Spread Spectrum. Technology used in radio transmission.
Incompatible with FHSS.
EAP Short for Extensible Authentication Protocol, EAP sits inside of Point-to-
Point Protocol's (PPP) authentication protocol and provides a generalized
framework for several different authentication methods. EAP is supposed
to head off proprietary authentication systems and let everything from
passwords to challenge-response tokens and public-key infrastructure
certificates all work smoothly.
EAP-AKA EAP-AKA (Extensible Authentication Protocol Method for UMTS
Authentication and Key Agreement) is an EAP mechanism for
authentication and session key distribution, using the Universal
Mobile Telecommunications System (UMTS) Subscriber Identity
Module (USIM). The USIM card is a special smart card used with
cellular networks to validate a given user with the network.
EAP-FAST EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The
main difference is that EAP-FAST does not use certificates to authenticate.
Provisioning in EAP-FAST is negotiated solely by the client as the first
communication exchange when EAP-FAST is requested from the server. If
the client does not have a pre-shared secret Protected Access Credential
(PAC), it can request to initiate a provisioning EAP-FAST exchange to
dynamically obtain one from the server.
EAP-FAST documents two methods to deliver the PAC: manual delivery
through an out-of-band secure mechanism, and automatic provisioning.
Manual delivery mechanisms can be any delivery mechanism that
the administrator of the network feels is sufficiently secure for their
network.
Automatic provisioning establishes an encrypted tunnel to protect
the authentication of the client and the delivery of the PAC to the
client. This mechanism, while not as secure as a manual method
may be, is more secure than the authentication method used in
LEAP.
The EAP-FAST method can be divided into two parts: provisioning, and
authentication. The provisioning phase involves the initial delivery of the
PAC to the client. This phase only needs to be performed once per client