S
Summit WM20 User Guide, Software Release 4.2
231
SSL
Secure Sockets Layer. A protocol developed by Netscape for
transmitting private documents via the Internet. SSL works by using a
public key to encrypt data that's transferred over the SSL connection.
URLs that require an SSL connection start with https: instead of http.
SSL uses a program layer located between the Internet's Hypertext
Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers.
The "sockets" part of the term refers to the sockets method of passing
data back and forth between a client and a server program in a
network or between program layers in the same computer. SSL uses
the public-and-private key encryption system from RSA, which also
includes the use of a digital certificate.
SSL has recently been succeeded by Transport Layer Security (TLS),
which is based on SSL.
Subnet mask
(
See
netmask)
Subnets
Portions of networks that share the same common address format. A
subnet in a TCP/IP network uses the same first three sets of numbers
(such as 198.63.45.xxx), leaving the fourth set to identify devices on the
subnet. A subnet can be used to increase the bandwidth on the
network by breaking the network up into segments.
SVP
SpectraLink Voice Protocol, a protocol developed by SpectraLink to be
implemented on access points in order to facilitate voice prioritization
over an 802.11 wireless LAN that will carry voice packets from
SpectraLink wireless telephones.
Switch
In networks, a device that filters and forwards packets between LAN
segments. Switches operate at the data link layer (layer 2) and
sometimes the network layer (layer 3) of the OSI Reference Model and
therefore support any packet protocol. LANs that use switches to join
segments are called switched LANs or, in the case of Ethernet
networks, switched Ethernet LANs.
syslog
A protocol used for the transmission of event notification messages
across networks, originally developed on the University of California
Berkeley Software Distribution (BSD) TCP/IP system
implementations, and now embedded in many other operating
systems and networked devices. A device generates a messages, a
relay receives and forwards the messages, and a collector (a syslog
server) receives the messages without relaying them.
Syslog uses the user datagram protocol (UDP) as its underlying
transport layer mechanism. The UDP port that has been assigned to
syslog is 514. (RFC3164)
S (Continued)
Содержание Summit WM20
Страница 8: ...Table of Contents Summit WM20 User Guide Software Release 4 2 8 ...
Страница 20: ...About this Guide Summit WM20 User Guide Software Release 4 2 20 ...
Страница 54: ...Configuring the Summit WM Controller Summit WM20 User Guide Software Release 4 2 54 ...
Страница 96: ...WM Access Domain Services Summit WM20 User Guide Software Release 4 2 96 ...
Страница 150: ...WM Access Domain Services Configuration Summit WM20 User Guide Software Release 4 2 150 ...
Страница 168: ...Availability and Controller Functionality Summit WM20 User Guide Software Release 4 2 168 ...
Страница 172: ...Working With Third Party APs Summit WM20 User Guide Software Release 4 2 172 ...
Страница 184: ...Working With the Summit WM Series Spy Summit WM20 User Guide Software Release 4 2 184 ...
Страница 194: ...Working With Reports and Displays Summit WM20 User Guide Software Release 4 2 194 ...
Страница 216: ...Performing System Maintenance Summit WM20 User Guide Software Release 4 2 216 ...