E
G
LOSSARY
Access Control List
(ACL)
ACLs can limit network traffic and restrict access to certain users or
devices by checking each packet for certain IP or MAC (i.e., Layer 2)
information.
Address Resolution
Protocol
(ARP)
ARP converts between IP addresses and MAC (i.e., hardware) addresses.
ARP is used to locate the MAC address corresponding to a given IP
address.
Boot Protocol
(BOOTP)
BOOTP is
used to provide bootup information for network devices,
including IP address information, the address of the TFTP server that
contains the devices system files, and the name of the boot file.
Class of Service
(CoS)
CoS is supported by prioritizing packets based on the required level of
service, and then placing them in the appropriate output queue. Priority
may be set according to the port default, the packet’s priority bit (in
the VLAN tag), or the DSCP priority bit.
Differentiated
Services Code Point
Service
(DSCP)
DSCP uses a six-bit tag to provide for up to 64 different forwarding
behaviors. Based on network policies, different kinds of traffic can be
marked for different kinds of forwarding. The DSCP bits are mapped to
the Class of Service categories, and then into the output queues.
Domain Name
Service
(DNS)
A system used for translating host names for network nodes into IP
addresses.
Dynamic Host
Control Protocol
(DHCP)
Provides a framework for passing configuration information to hosts on
a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP),
adding the capability of automatic allocation of reusable network
addresses and additional configuration options.
Extensible
Authentication
Protocol over LAN
(EAPOL)
EAPOL is a client authentication protocol used by this switch to verify
the network access rights for any device that is plugged into the
switch. A user name and password is requested by the switch, and
then passed to an authentication server (e.g., RADIUS) for verification.
Содержание 3CRDSF9PWR-US - OfficeConnect Managed Fast Ethernet PoE...
Страница 6: ...6 ABOUT THIS GUIDE...
Страница 14: ......
Страница 102: ...102 CHAPTER 4 MANAGING DEVICE SECURITY...
Страница 112: ...112 CHAPTER 5 MANAGING SYSTEM INFORMATION...
Страница 120: ...120 CHAPTER 6 CONFIGURING PORTS...
Страница 130: ...130 CHAPTER 7 AGGREGATING PORTS 3 Click The LACP Link Aggregation is modified and the application is updated...
Страница 140: ...140 CHAPTER 8 CONFIGURING VLANS...
Страница 198: ...198 CHAPTER 14 MANAGING SYSTEM FILES...
Страница 203: ...203 2 Define the fields 3 Click The settings are applied to the selected ports and the device is updated...
Страница 204: ...204 CHAPTER 15 MANAGING POWER OVER ETHERNET DEVICES...
Страница 228: ...228 APPENDIX A 3COM NETWORK MANAGEMENT...
Страница 234: ...234 APPENDIX B DEVICE SPECIFICATIONS AND FEATURES...
Страница 238: ...238 APPENDIX C PIN OUTS...
Страница 256: ......