ENGLISH - 117 AppendixGlossaryItem Descriptions SeepageAccess point These are stations for relaying electromagnetic signals between computersin a wireless LAN. When a computer is connected to an access point, it cancommunicate through the network connected to the access point.69AD HOC This is the mode in which computers communicate with each other directly,rather than via access points.69AES Next generation standard cryptography standardized by the National Institute ofStandards and Technology (NIST).AES: Advanced Encryption Standard69Default Gateway The devices that are used for different network standards from yours. DefaultGateway enables a connection with other network, by adjusting bilateraldifferences such as communication protocols. If no gateway is specified for theIP address of access destination, data will be sent to the host set as the defaultgateway.676875DHCP Abbreviation for Dynamic Host Configuration Protocol. This functionautomatically assigns IP addresses to the connected equipment. If a device withthe DHCP server function is present within a LAN, it automatically assigns IPaddresses to the connected equipment.676875EAP Abbreviation of PPP Extensible Authentication Protocol. An authenticationprotocol extended from PPP, which is used for user authentication for remoteaccess. MD5, TLS, S/Key, etc. are supported as authentication methods. Thisprotocol is adopted by the wireless LAN authentication standard IEEE 802.1X,and available methods include EAP-TLS/EAP-TTLS/EAP-LEAP/EAP-PEAP/EAP-MD5.70EAP-FAST Abbreviation of EAP-Flexible Authentication via Secure Tunneling. It is one ofthe wireless authentication methods compatible with IEEE 802.1X. It does notrequire digital authentication, but establishes a tunnel for the authenticationprocess using a secret key cryptosystem, and authenticates the tunnel mutuallyto improve security. Cisco’s proprietary method.70EAP-TTLS Abbreviation of EAP-Tunneled Transport Layer Security. It is one of the wirelessauthentication methods compatible with IEEE 802.1X. It performs mutualauthentication with a digital certificate by the authentication server, and ID/password by the client. A tunnel is established for the authentication process.Developed by Func Software in the U.S.70GTC(EAP-GTC)Abbreviation of EAP-Generic Token Card. It is one of the wireless authenticationmethods compatible with IEEE 802.1X. Authentication is performed with ID andpassword. Password is acquired from a security token.70INFRASTRUCTURE(infrastructuremode)This is the mode in which communications are performed via the access point. 68IP address Internet Protocol (IP) is a protocol for distributing data, and the addresscorresponding to the data distribution destination is called the IP address. Thesame IP address cannot be used within the same LAN.676875LAN Abbreviation for Local Area Network. This is a network with a relatively narrowrange such as inside a company.17MAC address Each network adapter has its own ID No.A discrete ID No. is assigned to each and every network adapter around theworld. These IDs are used to exchange data between adapters. These IDsare a combination of a discrete number managed and assigned by the IEEE toeach individual manufacturer and a unique number assigned to each individualadapter by the manufacturer.89