of two large prime numbers. This is called the factoring problem. RSA stands for Ron Rivest, Adi Shamir
and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English
mathematician, developed an equivalent system in 1973, but it wasn't declassified until 1997.
RSN
Robust Security Network is a new standard within IEEE 802.11 to provide security and privacy
mechanisms. The RSN (and related
) both specify IEEE 802.1x authentication with Extensible
Authentication Protocol (EAP).
RSTP
Rapid Spanning Tree Protocol, described in IEEE 802.1w, is an enhanced version of
that provides faster convergence. The Extreme Networks implementation of RSTP allows
seamless interoperability with legacy STP.
SMTP
Simple Mail Transfer Protocol uses the
TCP (Transmission Control Protocol)
to provide a mail service
modeled on the FTP file transfer service. SMTP transfers mail between systems.
SNMP
Simple Network Management Protocol is a standard that uses a common software agent to remotely
monitor and set network configuration and runtime parameters. SNMP operates in a multivendor
environment, and the agent uses
MIB (Management Information Base)
s, which define what information
is available from any manageable network device. You can also set traps using SNMP, which send
notifications of network events to the system log.
SNTP
Simple Network Time Protocol is used to synchronize the system clocks throughout the network. An
extension of
, SNTP can usually operate with a single server and allows for
IPv6 addressing.
SSH
Secure Shell, sometimes known as Secure Socket Shell, is a UNIX-based command interface and
protocol of securely gaining access to a remote computer. With SSH commands, both ends of the
client/server connection are authenticated using a digital certificate, and passwords are protected by
being encrypted. At Extreme Networks, the SSH is a separate software module, which must be
downloaded separately. (SSH is bundled with SSL in the software module.)
SSID
The Service Set Identifier is a 32-character unique identifier attached to the header of packets sent over
a Wireless LAN that acts as a password when a wireless device tries to connect to the
. Several BSSs can be joined together to form one logical
). The SSID is used to identify the ESS.
SSL
Secure Socket Layer is a protocol for transmitting private documents using the Internet. SSL works by
using a public key to encrypt data that is transferred over the SSL connection. SSL uses the public-and-
private key encryption system, which includes the use of a digital certificate. SSL is used for other
applications than
, for example, OpenFlow.
STP
Glossary
ExtremeSwitching 200 Series: Administration Guide
364