
Glossary
– 1089 –
SSH
Secure Shell is a secure replacement for remote access functions, including Telnet. SSH can
authenticate users with a cryptographic key, and encrypt data connections between
management clients and the switch.
STA
Spanning Tree Algorithm is a technology that checks your network for any loops. A loop can
often occur in complicated or backup linked network systems. Spanning Tree detects and
directs data along the shortest available path, maximizing the performance and efficiency
of the network.
Terminal Access Controller Access Control System Plus. TA
CACS+
is a logon authentication
protocol that uses software running on a central server to control access to TACACS-
compliant devices on the network.
TCP/IP
Transmission Control Protocol/Internet Protocol. Protocol suite that includes TCP as the
primary transport protocol, and IP as the network layer protocol.
Telnet
Defines a remote communication facility for interfacing to a terminal device over TCP/IP.
TFTP
Trivial File Transfer Protocol.
A TCP/IP protocol commonly used for software downloads.
UDP
User Datagram Protocol. UD
P
provides a datagram mode for packet-switched
communications. It uses IP as the underlying transport mechanism to provide access to IP-
like services. UDP packets are delivered just like IP packets – connection-less datagrams that
may be discarded before reaching their targets. UDP is useful when TCP would be too
complex, too slow, or just unnecessary.
UTC
Universal Time Coordinate. UTC is a time scale that couples Greenwich Mean Time (based
solely on the Earth’s rotation rate) with highly accurate atomic time. The UTC does not have
daylight saving time.
VLAN
Virtual LAN. A Virtual LAN is a collection of network nodes that share the same collision
domain regardless of their physical location or connection point in the network. A VLAN
serves as a logical workgroup with no physical barriers, and allows users to share
information and resources as though located on the same LAN.
VRRP
Virtual Router Redundancy Protocol uses a virtual IP address to support a primary router
and multiple backup routers. The backups can be configured to take over the workload if
the master fails or to load share the traffic. The primary goal of VRRP is to allow a host device
which has been configured with a fixed gateway to maintain network connectivity in case
the primary gateway goes down.
Содержание AS5700-54X
Страница 42: ...Contents 42...
Страница 44: ...Figures 44...
Страница 52: ...Tables 52...
Страница 54: ...Section I Getting Started 54...
Страница 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 358: ...Chapter 9 Access Control Lists ACL Information 358...
Страница 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Страница 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Страница 442: ...Chapter 16 Address Table Commands 442...
Страница 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Страница 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Страница 544: ...Chapter 20 Quality of Service Commands 544...
Страница 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Страница 680: ...Chapter 23 LLDP Commands 680...
Страница 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Страница 732: ...Chapter 25 Domain Name Service Commands 732...
Страница 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Страница 1072: ...Section III Appendices 1072...
Страница 1090: ...Glossary 1090 XModem A protocol used to transfer files between devices Data is grouped in 128 byte blocks and error corrected...
Страница 1102: ...List of CLI Commands 1102...
Страница 1115: ......
Страница 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...