8. GLOSSARY AND ACRONYMS
growth of the Internet and the predicted deple-
tion of available addresses, a new version of IP
(
), using 128 bits for the address, was de-
veloped in 1995.
IP masquerade
Kind of
IP masquerading
see
IPsec
Internet Protocol Security (IPsec) is a
protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypt-
ing each IP packet of a communication ses-
sion. The router allows user to select encap-
sulation mode (tunnel or transport), IKE mode
(main or aggressive), IKE Algorithm, IKE En-
cryption, ESP Algorithm, ESP Encryption and
much more. It is possible to create four different
tunnels.
IPv4
The Internet Protocol version 4 (IPv4) is
the fourth version in the development of the In-
ternet Protocol (IP) and the first version of the
protocol to be widely deployed. It is one of the
core protocols of standards-based internetwork-
ing methods of the Internet, and routes most traf-
fic in the Internet. However, a successor proto-
col,
, has been defined and is in various
stages of production deployment. IPv4 is de-
scribed in IETF publication RFC 791 (September
1981), replacing an earlier definition (RFC 760,
January 1980).
IPv6
The Internet Protocol version 6 (IPv6) is
the latest revision of the Internet Protocol (IP),
the communications protocol that provides an
identification and location system for computers
on networks and routes traffic across the Inter-
net. IPv6 was developed by the Internet Engi-
neering Task Force (IETF) to deal with the long-
anticipated problem of IPv4 address exhaustion.
IPv6 is intended to replace
, which still car-
ries the vast majority of Internet traffic as of
2013. As of late November 2012, IPv6 traffic
share was reported to be approaching 1%.
IPv6 addresses are represented as eight groups
of four hexadecimal digits separated by colons
(2001:0db8:85a3:0042:1000:8a2e:0370:7334),
but methods of abbreviation of this full notation
exist.
L2TP
Layer 2 Tunnelling Protocol (L2TP) is a
tunnelling protocol used to support virtual private
networks (
s) or as part of the delivery of ser-
vices by ISPs. It does not provide any encryption
or confidentiality by itself. Rather, it relies on an
encryption protocol that it passes within the tun-
nel to provide privacy.
LAN
A local area network (LAN) is a com-
puter network that interconnects computers in
a limited area such as a home, school, com-
puter laboratory, or office building using network
media. The defining characteristics of LANs, in
contrast to wide area networks (
), include
their usually higher data-transfer rates, smaller
geographic area, and lack of a need for leased
telecommunication lines.
NAT
In computer networking, Network Address
Translation (NAT) is the process of modifying
IP address information in IPv4 headers while in
transit across a traffic routing device.
The simplest type of NAT provides a one-to-one
translation of IP addresses. RFC 2663 refers to
this type of NAT as basic NAT, which is often also
called a one-to-one NAT. In this type of NAT only
the IP addresses, IP header checksum and any
higher level checksums that include the IP ad-
dress are changed. The rest of the packet is left
untouched (at least for basic TCP/UDP function-
ality; some higher level protocols may need fur-
ther translation). Basic NATs can be used to in-
terconnect two IP networks that have incompati-
ble addressing.
NAT-T
NAT traversal (NAT-T) is a computer
networking methodology with the goal to es-
tablish and maintain Internet protocol connec-
tions across gateways that implement network
address translation (
NTP
Network Time Protocol (NTP) is a net-
working protocol for clock synchronization be-
127
Содержание SmartMotion
Страница 1: ...Twin Cellular Module Router SmartMotion CONFIGURATION MANUAL ...
Страница 24: ...3 STATUS WiFi Scan output may look like this Figure 4 WiFi Scan 14 ...
Страница 27: ...3 STATUS Figure 5 Network Status 17 ...
Страница 38: ...4 CONFIGURATION Figure 15 Network Topology for Example 2 Figure 16 LAN Configuration for Example 2 28 ...
Страница 44: ...4 CONFIGURATION Figure 24 1st Mobile WAN Configuration 34 ...
Страница 62: ...4 CONFIGURATION Figure 31 WiFi Configuration 52 ...
Страница 86: ...4 CONFIGURATION Figure 46 IPsec Tunnels Configuration 76 ...
Страница 112: ...4 CONFIGURATION Figure 67 Example 2 USB port configuration 102 ...