G
LOSSARY
– 317 –
MD5
MD5 Message-Digest is an algorithm that is used to create digital
signatures. It is intended for use with 32 bit machines and is safer than the
MD4 algorithm, which has been broken. MD5 is a one-way hash function,
meaning that it takes a message and converts it into a fixed string of digits,
also called a message digest.
MIB
Management Information Base. An acronym for Management Information
Base. It is a set of database objects that contains information about a
specific device.
MLD S
NOOPING
Multicast Listener Discovery (MLD) snooping dynamically configures switch
ports to limit IPv6 multicast traffic so that it is forwarded only to ports with
users that want to receive it. This switch supports MLDv1, which includes
Listener Query, Listener Report, and Listener Done messages (equivalent
to IGMPv2 query, report, and leave messages).
MSTP
Multiple Spanning Tree Protocol can provide an independent spanning tree
for different VLANs. It simplifies network management, provides for even
faster convergence than RSTP by limiting the size of each region, and
prevents VLAN members from being segmented from the rest of the group.
M
ULTICAST
S
WITCHING
A process whereby the switch filters incoming multicast frames for services
for which no attached host has registered, or forwards them to all ports
contained within the designated multicast VLAN group.
MVR
Multicast VLAN Registration is a method of using a single network-wide
multicast VLAN to transmit common services, such as such as television
channels or video-on-demand, across a service-provider’s network. MVR
simplifies the configuration of multicast services by using a common VLAN
for distribution, while still preserving security and data isolation for
subscribers residing in both the MVR VLAN and other standard or
private VLAN groups.
NTP
Network Time Protocol provides the mechanisms to synchronize time
across the network. The time servers operate in a hierarchical-master-
slave configuration in order to synchronize local clocks within the subnet
and to national time standards via wire or radio.
P
ORT
A
UTHENTICATION
See IEEE 802.1X.
P
ORT
M
IRRORING
A method whereby data on a target port is mirrored to a monitor port for
troubleshooting with a logic analyzer or RMON probe. This allows data on
the target port to be studied unobstructively.
Summary of Contents for EX26262
Page 1: ...Layer 2 Gigabit PoE Ethernet Switch Management Guide...
Page 2: ......
Page 3: ...MANAGEMENT GUIDE...
Page 4: ......
Page 6: ...6 ABOUT THIS GUIDE...
Page 18: ...18 FIGURES...
Page 20: ...20 TABLES...
Page 22: ...22 SECTION I Getting Started...
Page 34: ...34 SECTION II Web Configuration...
Page 46: ...46 CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface...
Page 290: ...290 CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling...
Page 294: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 294...
Page 300: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 300...
Page 302: ...302 SECTION III Appendices...
Page 320: ...GLOSSARY 320...
Page 325: ......
Page 326: ......