Index
Symbols and numbers
: (colon), IPv146
- (hyphen), VLANs
[] (square brackets), IPv146
2.4 GHz
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
5.5 Mbps
5GHz
IEEE 802.11a
IEEE 802.11n
10Base65
10Base65
10BaseT
half-duplex Ethernet
IEEE 802.65
10GBase-Extended Range (ER)
10GBase-Extra Long Wavelength (EW)
10GBase-Long Range (LR)
10GBase-Long Wavelength (LW)
10GBase-Short Range (SR)
10GBase-Short Wavelength (SW)
10GBase-T
11 Mbps
40Mhz
54Mbps
100Base-CX
100Base-FX
100Base-TX
1000Base-LX
1000Base-SX
1000Base-T
1000Base-ZX
operation
A
A. See active state
ABRs. See Area Border Routers
access
access lists
extended
standard
access points (AP)
access-class
ACLs
CLI/SDM
filters
Telnet
troubleshooting
verification
active state (A)
AD. See administrative distance
address learning
Address Resolution Protocol (ARP)
addressing
administrative distance (AD)
administrative_distance
administratively down
Advanced Encryption Standard (AES)
AES. See Advanced Encryption Standard
AES-CCMP. See AES-Counter Mode CBC-MAC Protocol
AES-Counter Mode CBC-MAC Protocol (AES-CCMP)
anycast
AP. See access points
applications
Application layer
application servers
application-specific integrated circuit (ASIC)
areas
area 204
Area Border Routers (ABRs)
ARP. See Address Resolution Protocol
ASBR. See Autonomous System Boundary Router
ASCII
ASIC. See application-specific integrated circuit
Asynchronous Transfer Mode (ATM)
ATM. See Asynchronous Transfer Mode
authentication
CBC-MAC
MAC
Peer Router Authentication
PPP
ppp authentication chap
proxy
Authentication
auto-detect mechanisms
Autonomous System Boundary Router (ASBR)
autorooters
aux
auxiliary passwords
B
B2B. See business-to-business
back ups
IOS
routers
backbone area
BackboneFast
backdoors
backoff algorithms
bandwidth
bandwidth (BW)
static routing
WAN
routers
banners
base MAC addresses
Basic Service Set (BSS)
binding
block sizes
boot sequence
bootstrap
Bootstrap Protocol (BootP)
BPDUs
bridges
multiport
Bridge-Group Virtual Interface (BVI)
broadcast domains
flat networks
hosts
VLANs
broadcast storm
brute force attack
BSS. See Basic Service Set
business-to-business (B2B)
BVI. See Bridge-Group Virtual Interface
BW. See bandwidth
C
C
cable TV (CATV)
CAM. See content addressable memory
Capability
carrier detect (CD)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
CATV. See cable TV
CBAC. See Context-Based Access Control
CBC-MAC. See Counter Mode Cipher Block Chaining-Message Authentication Code
CD. See carrier detect
CDP. See Cisco Discovery Protocol
cdp holdtime
cdp timers
central office (CO)
channel service unit/data service unit (CSU/DSU)
CIDR. See Classless Inter-Domain Routing
circuit switching
Cisco Discovery Protocol (CDP)
Class A IP addresses
Class B IP addresses
Class C IP addresses
classful routing
Classless Inter-Domain Routing (CIDR)
classless routing
CLI. See command-line interface
client mode, VTP
CLI/SDM
clock rate
clocking
CO. See central office
collision domains
command.com
command-line interface (CLI)
PPP
router IP addresses
config vlan
config-line
config-router
configuration register
configure memory
configure network
configure terminal
connectionless protocol
connection-oriented communication
console
console passwords
content addressable memory (CAM)
Context-Based Access Control (CBAC)
copy flash tftp
copy run start
copy running-config startup-config
copy running-config tftp
copy startup-config tftp
copy tftp flash
copy tftp running-config
copy tftp startup-config
copy-startup-config running-config
Counter Mode Cipher Block Chaining-Message Authentication Code (CBC-MAC)
CPE. See customer premises equipment
CRC
crossover cable
CSMA/CA. See Carrier Sense Multiple Access with Collision Avoidance
CSMA/CD. See Carrier Sense Multiple Access with Collision Detection
CSU/DSU. See channel service unit/data service unit
Current configuration
customer premises equipment (CPE)
D
data communication equipment (DCE)
Data Link Connection Identifier (DLCI)
Data Link layer
Ethernet
Frame Relay
HDLC
ISDN
data terminal equipment (DTE)
datagrams
DCE. See data communication equipment
DDoS. See Distributed Denial of Service
DEBUG
debug
debug all
debug eigrp packet
debug frame lmi
debug ip eigrp events
debug ip eigrp notification
debug ip ospf adj
debug ip ospf hello
debug ip ospf packet
debug ip rip
debug ppp authentication
debugging
OSPF
PPP
de-encapsulation
default gateway
default routing
default-network
default-router 1.2.3.4.
delimiting characters
demarcation point
Denial of Service (DoS)
deny
deny any
Department of Defense (DoD)
description
desirable mode
destination URL policy management
Device ID
DFS. See Dynamic Frequency Selection
DHCP. See Dynamic Host Configuration Protocol
Digital, Intel, and Xerox (DIX)
Digital Signal 0 (DS0)
Digital Subscriber Line (DSL)
Digital Subscriber Line access Multiplexer (DSLAM)
Dijkstra algorithm
Direct Sequence Spread Spectrum (DSSS)
disable
distance-vector protocols
distribute list
Distributed Denial of Service (DDoS)
DIX. See Digital, Intel, and Xerox
DLCI. See Data Link Connection Identifier
DNS. See Domain Name Service
DoD. See Department of Defense
domains. See also broadcast domains; collision domains; fully qualified domain name
Domain Name Service (DNS)
hostnames
IP addresses
troubleshooting
DoS. See Denial of Service
DRAM. See dynamic RAM
DS0. See Digital Signal 0
DSL. See Digital Subscriber Line
DSLAM. See Digital Subscriber Line access Multiplexer
DSSS. See Direct Sequence Spread Spectrum
DTE. See data terminal equipment
DTP. See Dynamic Trunking Protocol
dual stacking
duplex
dynamic
dynamic ACLs
Dynamic Frequency Selection (DFS)
Dynamic Host Configuration Protocol (DHCP)
conflicts
global configuration mode
pools
interfaces
routers
wireless networks
troubleshooting
dynamic NAT
dynamic RAM (DRAM)
dynamic routing
Dynamic Trunking Protocol (DTP)
E
E300
EEPROM. See Electronically Erasable Programmable Read-Only Memory
EIA/TIA-232-C
EIGRP
AD
load-balance
serial interfaces
troubleshooting
verification
Electronically Erasable Programmable Read-Only Memory (EEPROM)
enable password
enable secret
encapsulation
DTP
Frame Relay
GRE
HDLC
IEEE 802.1q
PPP
WAN
encapsulation
encryption
encryption keys
ER. See 10GBase-Extended Range
erase startup-config
ESS. See Extended Service Set
ESS Extended Service Set Mesh Networking
Ethernet. See also specific Ethernet types
CSMA/CA
CSMA/CD
Data Link layer
distance constraints
Physical layer
UTP
ETSI. See European Telecommunications Standards Institute
European Telecommunications Standards Institute (ETSI)
EW. See 10GBase-Extra Long Wavelength
exitinterface
extended access lists
Extended Service Set (ESS)
extranet VPN
F
Fast Ethernet
ISR
running-config
fast roaming
FastEthernet 0/185
FCC. See Federal Communications Commission
FCS
FD. See feasible distance
FDDI
feasible distance (FD)
Federal Communications Commission (FCC)
File Transfer Protocol (FTP)
filters
ACLs
Application layer
forward/filter table
frames
URL
fixed-configuration routers
flash memory
IOS
verification
flat networks
forward/filter table
FQDN. See fully qualified domain name
frames
Frame Relay
encapsulation
IETF
mappings
routers
single interface
subinterfaces
troubleshooting
WAN
FTP. See File Transfer Protocol
full-duplex Ethernet
fully qualified domain name (FQDN)
G
Gateway(config)#
gateways
gateway of last resort
Generic Routing Encapsulation (GRE)
Gigabit Ethernet
global configuration mode
global unicast addresses
globalnet
graphical user interface (GUI)
gratuitous ARP
GRE. See Generic Routing Encapsulation
guest-mode
GUI. See graphical user interface
H
half-duplex Ethernet
HDLC. See High-Level Data-Link Control
HFC. See hybrid fibre-coaxial
High-Level Data-Link Control (HDLC)
encapsulation
WAN
High-Speed Serial Data Connector (HSSDC)
Holdtime
hop count
hosts
broadcast domain
switches
hostname
hostnames
DNS
ping
SSH
Telnet
Host-to-Host layer
HSSDC. See High-Speed Serial Data Connector
HTTP
Application layer attacks
IPv146
Network layer
hubs
collision domains
routers
switches
hybrid fibre-coaxial (HFC)
hybrid protocols
I
IARP. See Inverse ARP
IBSS. See Independent Basic Service Set
ICMP. See Internet Control Message Protocol
IEEE. See Institute of Electrical and Electronics Engineers
IETF. See Internet Engineering Task Force
if-then
I/G. See Individual/Group
IGP
IGRP
implicit deny
inbound access lists
Independent Basic Service Set (IBSS)
Individual/Group (I/G)
Industrial, Scientific and Medical (ISM)
infrastructure-ssid
Institute of Electrical and Electronics Engineers (IEEE)
IEEE 801.3ae
IEEE 801.q
IEEE 802.1d
IEEE 802.1q
IEEE 802.1w
IEEE 802.65
Ethernet Physical layer
half-duplex Ethernet
IEEE 802.3ab
IEEE 802.3u
IEEE 802.3z
IEEE 802.
WLAN security,
IEEE 802.11a
IEEE 802.11b
IEEE 802.11d
IEEE 802.11e
IEEE 802.11f
IEEE 802.11g
IEEE 802.11h
IEEE 802.11i
IEEE 802.11j
IEEE 802.11k
IEEE 802.11n
MIMO
Physical layer
IEEE 802.11r
IEEE 802.11s
IEEE 802.11t
IEEE 802.11v
IEEE 802.11w
IEEE 802.11y
Integrated Services Digital Network (ISDN)
Integrated Services Router (ISR)
Inter-Access Point Protocol
interfaces. See also network interface card; serial interface
configuration
verification,
descriptions
DHCP pools
extended access lists
Fast Ethernet
GUI
IP addresses
masks
no shut down
routers
masks
running-config
show running-config
shutdown
VTY
interface e177
interface fastethernet 0/177
interface range
interface serial 0/1/177
interface type number
interface type slot/port
International Organization for Standardization (ISO)
international roaming
Internet Control Message Protocol (ICMP)
Internet Engineering Task Force (IETF)
Internet layer
Internet Protocol Control Protocol (IPCP)
Internetwork Packet Exchange Control Protocol (IPXCP)
Inter-Switch Link (ISL)
routers
inter-VLAN
IP addresses
routers
troubleshooting,
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
intrusion detection
Inverse ARP (IARP)
IOS
access lists
back up
bootstrap
copy flash tftp
flash memory
NVRAM
privileged mode
restore
ROM
routers
show flash
show version
TFTP
IOS Firewall
IOS Router and Firewall Provisioning
ip address address mask
IP addresses, . See also access lists; IPv4; IPv6; TCP/IP
Class A
Class B
Class C
copy flash tftp
DHCP
DNS
interfaces
inter-VLAN
IPv
many-to-one
mismatched
Network layer
NIC
OSPF
packets
ping
private
routers
CLI
show cpd neighbor
special purposes
subinterfaces
summarization
switches
Telnet
troubleshooting
VLAN switches
VLSM
WAN
ip default-gateway
ip default-network
ip dhcp pool_name network_address mask
ip domain-lookup
ip name-server
ip name-server 1.2.3.4.
ip nat inside
ip nat outside
ip route
IP spoofing
IP stack
failure
ip subnet-zero
ipconfig /all
IPCP. See Internet Protocol Control Protocol
IPSec
IPv
ISATAP
NAT
6to4 tunneling
IPv
IP addresses
ISATAP
OSPF
routers
6to4 tunneling
IPXCP. See Internetwork Packet Exchange Control Protocol
ISATAP. See Intra-Site Automatic Tunnel Addressing Protocol
ISDN. See Integrated Services Digital Network
ISL. See Inter-Switch Link
ISM. See Industrial, Scientific and Medical
ISO. See International Organization for Standardization
ISR. See Integrated Services Router
K
keepalives
L
L2F. See Layer 2 Forwarding
L2TP. See Layer 2 Tunneling Protocol
LAPB. See Link Access Procedure, Balanced
LAPD. See Link Access Procedure, D-Channel
latency
latency
layers. See also specific layers
addressing
architecture
Layer 2 Forwarding (L2F)
layer 2 switches
address learning
forward/filter table
Layer 2 Tunneling Protocol (L2TP)
LCP. See Link Control Protocol
leased lines
line
Line Printer (LPR)
Line Printer Daemon (LPD)
Link Access Procedure, Balanced (LAPB)
Link Access Procedure, D-Channel (LAPD)
Link Control Protocol (LCP)
link-local addresses
Link-local Signaling (LLS)
link-state protocols
LLS. See Link-local Signaling
LMI
lmi
LMI DLCI
load-balance
Local Interface
local loop
Lock and Key ACLs
log
logical interfaces
login
loop avoidance
loopback
LPD. See Line Printer Daemon
LPR. See Line Printer
LR. See 10GBase-Long Range
LW. See 10GBase-Long Wavelength
M
MAC. See Media Access Control
man-in-the-middle attacks
many-to-one, IP addresses
map
mask
masks. See also subnet masks; wildcard masks
interfaces
router interfaces
VLANs
maximum transmission units (MTUs)
Media Access Control (MAC)
authentication
base MAC addresses
Ethernet
forward/filter table
IEEE 802.11n
security
show mac address-group
show mac address-table
switches
ports
memory. See specific memory types
message of the day (MOTD)
MIMO. See multiple input, multiple output
Mini-IOS
mobility
mode
MOTD. See message of the day
MPLS. See MultiProtocol Label Switching
MTUs. See maximum transmission units
multicast
multiple input, multiple output (MIMO)
multipoint
multiport bridges
MultiProtocol Label Switching (MPLS)
N
named access lists
NAT. See Network Address Translation
nat pool
National Institute of Standards and Technology (NIST)
NCP. See Network Control Protocol
network
Network Access layer
Network Address Translation (NAT)
CIDR
CLI/SDM
dynamic
IPv289
overloading
static
troubleshooting
virtual servers
Network Control Protocol (NCP)
Network File System (NFS)
UDP
network interface card (NIC)
Network layer
addressing
FTP
HTTP
IP addresses
PDUs
show cdp entry * protocol
Telnet
network management stations (NMSs)
network reconnaissance
next-hop_address
NFS. See Network File System
NIC. See network interface card
NIST. See National Institute of Standards and Technology
NMSs. See network management stations
no cdp run
no debug all
no ip domain-lookup
no login
no shutdown
nonnegotiate
nonvolatile RAM (NVRAM)
back up
running-config
startup-config
TFTP
verification
O
OC-3. See Optical Carrier 3
OC-12. See Optical Carrier 12
OC-48. See Optical Carrier 48
OFDM. See Orthogonal Frequency Division Multiplexing
one-to-many addresses. See multicast
open access
Open Shortest Path First (OSPF)
areas
debugging
serial interfaces
show
Open Systems Interconnection (OSI)
model
open-key authentication
Optical Carrier 3 (OC-3)
Optical Carrier 12 (OC-12)
Optical Carrier 48 (OC-48)
organizationally unique identifier (OUI)
Orthogonal Frequency Division Multiplexing (OFDM)
OSI. See Open Systems Interconnection
OSPF. See Open Shortest Path First
OUI. See organizationally unique identifier
outbound access lists
overhead
overloading
P
P. See passive state
packets
Data Link layer
routers
sniffers
switching
Transport layer
Packet InterNet Groper (ping)
DNS
hostnames
IP addresses
NIC
privileged mode
remote server
router
running-config
user mode
parallel transmission
passive state (P)
passphrase
passwords
attacks
PPP
VTP
PAT. See Port Address Translation
PDUs. See Protocol Data Units
Peer Router Authentication
permanent
permit
per-user firewalls
Per-VLAN Spanning-Tree (PVST)
physical interfaces
Physical layer
DSL
Ethernet
Frame Relay
WAN
ping. See Packet InterNet Groper
“Ping of Death” attacks
Platform
point of presence (POP)
point-to-point connection
Point-to-Point Protocol (PPP)
authentication
debugging
encapsulation
ISDN
passwords
routers
show interface
verification
WAN
Point-to-Point Protocol over Ethernet (PPPoE)
Point-to-Point Tunneling Protocol (PPTP)
Policy-Based, Multi-Interface Support
pool
POP. See point of presence
ports. See also switch ports
base MAC addresses
latency
numbers, Transport layer
redirection attacks
RJ-83
RSTP
security
trunks
VLANs
Port Address Translation (PAT)
Port ID
PortFast
power-on self-test (POST)
PPP. See Point-to-Point Protocol
ppp authentication chap
PPPoE. See Point-to-Point Protocol over Ethernet
PPTP. See Point-to-Point Tunneling Protocol
Presentation layer
Pre-Shared Key (PSK)
private IP addresses
privileged mode
Process/Application layer
protected management frames
Protocol Data Units (PDUs)
layer addressing
layered architecture
Network layer
segments
Transport layer
PSK. See Pre-Shared Key
public safety
PVC
pvc
PVST. See Per-VLAN Spanning-Tree
Q
quality of service
R
radio frequency (RF)
radio measurements
random access memory (RAM). See also dynamic RAM; nonvolatile RAM
Rapid Spanning-Tree Protocol (RSTP)
IEEE 802.1w
troubleshooting
read-only memory (ROM)
reference models
reflexive ACLs
reload
remote access
switches
VPN
remote server
restore
RF. See radio frequency
RID
RIP
RIPv132
RIPv
OSPF
VLSM
RJ-
demarcation point
ports
roaming
rolled cable
ROM. See read-only memory
rootkit
route aggregation. See summarization
Router#
Router(config)#
router eigrp
router ospf process-id
routers/routing. See also specific router/routing types
administrative configuration
back ups
boot sequence
broadcast domain
classful
classless
configuration mode
debug
default
DHCP pools
DNS
dynamic
flash memory
Frame Relay
global configuration mode
HDLC
hostname
hubs
interfaces
masks
inter-VLAN
IOS
IP addresses
CLI
IPv4
ISL
network segmentation
packets
passwords
ping
POST
PPP
privileged mode
protocols
restore
running-config
security
serial interface
setup mode
show
specific configuration mode
static
subinterfaces
subnet masks
switches
traceroute
troubleshooting
user mode
VLANs
WAN
serial transmission
wildcard masking
RSTP. See Rapid Spanning-Tree Protocol
running-config
DRAM
Fast Ethernet
interfaces
NVRAM
ping
RAM
routers
Telnet
running-config tftp
RXBOOT
S
SDLC. See Synchronous Data Link Control
secondary
Secure Shell (SSH)
encryption keys
VTY
security
appliances
banners
IEEE 802.11i
MAC
ports
private IP addresses
routers
SSID
static routing
switches
threats
VLANs
wireless networks
WLAN
segments
PDUs
switches
TCP
UDP
sendmail
serial interface
serial transmission
Serial0/189
server mode
service password-encryption
Service Set ID (SSID)
security
Session Initiation Protocol (SIP)
Session layer
setup mode
shared-key authentication
shortest-path-first protocols. See link-state protocols
SHOW
show
show access-list
show access-list 286
show cdp
show cdp entry * protocol
show cdp neighbor
show controllers int
show cpd entry *
show cpd neighbor
show cpd neighbors detail
show flash
show frame ?
show frame map
show frame pvc
show frame-relay
show interface
LMI
PPP
verification
show interface fastethernet 0/184
show interface int
show interface serial 0/0/186
show interface trunk
show interfaces
show ip access-list
show ip arp
show ip eigrp neighbors
show ip eigrp topology
show ip interface
show ip interface brief
show ip ospf
show ip ospf database
show ip ospf interface
show ip ospf neighbor
show ip protocols
show ip route
show ip route eigrp
show mac address-group
show mac address-table
show port-security interface
show processes
show running-config
interfaces
mismatched IP addresses
show spanning-tree
show startup-config
show version
show vlan
show vtp status
shutdown
Simple Mail Transfer Protocol (SMTP)
Simple Network Management Protocol (SNMP)
SIP. See Session Initiation Protocol
site-to-site VPN
6to4 tunneling
smart-serial
SMTP. See Simple Mail Transfer Protocol
sniffers
SNMP. See Simple Network Management Protocol
Spanning Tree Protocol (STP)
specific configuration mode
speed
SR. See 10GBase-Short Range
SSH. See Secure Shell
SSID. See Service Set ID
standard access lists
startup-config
NVRAM
restore
static NAT
static routing
STP. See Spanning Tree Protocol
straight-through cable
subinterfaces
subnets
subnet masks. See also Variable Length Subnet Masks
routers
static routing
VLSM
summarization
SW. See 10GBase-Short Wavelength
switches . See also layer 2 switches
administrative configuration
bridges
collision domains
configuration
crossover cable
DEBUG
frames
hosts
hubs
IEEE 802.1q
IP addresses
layer 2
MAC
multiport bridges
network segmentation
POST
remote access management
routers
security
segments
SHOW
troubleshooting
verification
VLANs
IP addresses
VTP
switch ports
access mode
access ports
desirable mode
MAC
trunk ports
VLANs
switchport
switchport access
switchport mode access
switchport mode dynamic auto
switchport mode dynamic desirable
switchport mode trunk
switchport nonnegotiate
switchport port-security mac-address
Synchronous Data Link Control (SDLC)
sys-id-ext
system restarted by bus error
T
T300
T300
tables, VLSM
TCP. See Transmission Control Protocol
TCP SYN Flood
TCP/IP
Telnet
ACLs
hostnames
IP addresses
Network layer
passwords
running-config
telnet
Temporal Key Integrity Protocol (TKIP)
Teredo
TFN. See Tribe Flood Network
TFN2K. See Tribe Flood Network 2000
TFTP. See Trivial File Transfer Protocol
thin protocol
time to live (TTL)
timers
TKIP. See Temporal Key Integrity Protocol
Token Ring
toll network
TPC. See Transmit Power Control
trace
traceroute
ICMP
TTL
Transmission Control Protocol (TCP), . See also TCP/IP
Application layer
Host-to-Host layer
segments
Transport layer
Transmit Power Control (TPC)
transparent bridging
transparent mode
Transport layer
port numbers
TCP
Tribe Flood Network (TFN)
Tribe Flood Network 2000 (TFN2K)
Trivial File Transfer Protocol (TFTP)
back up
IOS
NVRAM
Trojan horse
troubleshooting
ACLs
DHCP
DNS
EIGRP
Frame Relay
inter-VLAN routers
IP addresses
NAT
OSPF
RIPv
routers
RSTP
switches
VLANs
VTP
WAN
trunk
trunk [parameter]
trunks. See also Virtual Trunk Protocol
DTP
ports
VLANs
trust exploitation attacks
trusted networks
TTL. See time to live
U
UDP. See User Datagram Protocol
unicast
unique local addresses
Unlicensed National Information Infrastructure (UNII)
unshielded twisted pairs (UTP)
untrusted networks
UplinkFast
URL filters
User Datagram Protocol (UDP)
Host-to-Host layer
6to4 tunneling
user mode
username
UTP. See unshielded twisted pairs
V
V.303
V.303
Variable Length Subnet Masks (VLSM)
block sizes
classful routing
classless routing
IP addresses
OSPF
RIPv163
subnets
summarization
tables
verification
ACLs
default routing
EIGRP
flash memory
interface configuration
NVRAM
PPP
show interface
show ip interface
static routing
switches
WAN
version 164
virtual circuit
virtual LANs (VLANs)
broadcast domains
default gateway
masks
ports
routers
security
switches
IP addresses
switch ports
switches
troubleshooting
trunks
VTP
virtual private network (VPN)
remote access
virtual servers, NAT
Virtual Trunk Protocol (VTP)
client mode
domains
passwords
server mode
switches
switches
transparent mode
troubleshooting
VLANs
viruses
VLANs. See virtual LANs
VLSM. See Variable Length Subnet Masks
voice
VPN. See virtual private network
VTP. See Virtual Trunk Protocol
vtp
vtp server
VTY
vty
W
WAN
BW
connection types
encapsulation
IP addresses
routers
serial transmission
support
terms
troubleshooting
verification
web servers
WEP. See Wired Equivalent Protocol
Wi-Fi Alliance
Wi-Fi Protected Access (WPA)
wildcard masks
Wired Equivalent Protocol (WEP)
wireless networks
AP
DHCP pools
IEEE 802.11v
open access
security
SSID
Wireless Performance Prediction (WPP)
WLAN Association (WLANA)
WLANs
administration
encryption
security
WPA. See Wi-Fi Protected Access
WPA
WPP. See Wireless Performance Prediction
X
X Window
X.50