
11
Wireless Intrusion Detection System
Wireless Intrusion Prevention System
Cisco Wireless LAN Controller
Cisco Wireless Control System
The following terms are used in this Security Target:
Table 2 Terms & Definitions
The IEEE 802.1X standard provides a framework for many
authentication types and the link layer.
Provides authentication, authorization and accounting. Also known as a
NAS
The IT Environment that includes the hardware and operating system
that hosts the ACS and/or ISE software.
The Operating System that runs on the ACS Host is a CentOS Linux
distribution operating system, as configured for use by the ACS
software.
Stands for the extensible authentication protocol (EAP). EAP is a
protocol that supports the communication of other authentication
protocols. EAP uses its own start and end messages which allows it to
then support any number of third-party messages between supplicants
and an authentication server.
Stands for EAP-flexible authentication secure tunneling (EAP-FAST).
This method provides an encrypted tunnel to distribute pre-shared keys
known as protected access credential (PAC) keys.
EAP-GTC (Generic Token Card), which is described in RFC 2284, is
used for authenticating token card credentials across the network. EAP-
GTC is typically used inside a TLS tunnel created by TTLS or PEAP to
provide server authentication in wireless environments.
Komentáře k této Příručce