
Glossary
– 1089 –
SSH
Secure Shell is a secure replacement for remote access functions, including Telnet. SSH can
authenticate users with a cryptographic key, and encrypt data connections between
management clients and the switch.
STA
Spanning Tree Algorithm is a technology that checks your network for any loops. A loop can
often occur in complicated or backup linked network systems. Spanning Tree detects and
directs data along the shortest available path, maximizing the performance and efficiency
of the network.
Terminal Access Controller Access Control System Plus. TA
CACS+
is a logon authentication
protocol that uses software running on a central server to control access to TACACS-
compliant devices on the network.
TCP/IP
Transmission Control Protocol/Internet Protocol. Protocol suite that includes TCP as the
primary transport protocol, and IP as the network layer protocol.
Telnet
Defines a remote communication facility for interfacing to a terminal device over TCP/IP.
TFTP
Trivial File Transfer Protocol.
A TCP/IP protocol commonly used for software downloads.
UDP
User Datagram Protocol. UD
P
provides a datagram mode for packet-switched
communications. It uses IP as the underlying transport mechanism to provide access to IP-
like services. UDP packets are delivered just like IP packets – connection-less datagrams that
may be discarded before reaching their targets. UDP is useful when TCP would be too
complex, too slow, or just unnecessary.
UTC
Universal Time Coordinate. UTC is a time scale that couples Greenwich Mean Time (based
solely on the Earth’s rotation rate) with highly accurate atomic time. The UTC does not have
daylight saving time.
VLAN
Virtual LAN. A Virtual LAN is a collection of network nodes that share the same collision
domain regardless of their physical location or connection point in the network. A VLAN
serves as a logical workgroup with no physical barriers, and allows users to share
information and resources as though located on the same LAN.
VRRP
Virtual Router Redundancy Protocol uses a virtual IP address to support a primary router
and multiple backup routers. The backups can be configured to take over the workload if
the master fails or to load share the traffic. The primary goal of VRRP is to allow a host device
which has been configured with a fixed gateway to maintain network connectivity in case
the primary gateway goes down.
Summary of Contents for AS5700-54X
Page 42: ...Contents 42...
Page 44: ...Figures 44...
Page 52: ...Tables 52...
Page 54: ...Section I Getting Started 54...
Page 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 358: ...Chapter 9 Access Control Lists ACL Information 358...
Page 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Page 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Page 442: ...Chapter 16 Address Table Commands 442...
Page 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Page 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Page 544: ...Chapter 20 Quality of Service Commands 544...
Page 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Page 680: ...Chapter 23 LLDP Commands 680...
Page 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Page 732: ...Chapter 25 Domain Name Service Commands 732...
Page 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Page 1072: ...Section III Appendices 1072...
Page 1102: ...List of CLI Commands 1102...
Page 1115: ......
Page 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...