EAP-TTLS (Tunneled Transport Layer Security) is an extension of EAP-TLS to provide certificate-based,
mutual authentication of the client and network through an encrypted tunnel, as well as to generate
dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
(See also
PEAP (Protected Extensible Authentication Protocol)
.)
EAPS
Extreme Automatic Protection Switching is an Extreme Networks-proprietary version of the Ethernet
Automatic Protection Switching protocol that prevents looping Layer 2 of the network. This feature is
discussed in RFC 3619.
ECMP
Equal Cost Multi Paths is a routing algorithm that distributes network traffic across multiple high-
bandwidth
OSPF (Open Shortest Path First)
, IS-IS, and static routes to
increase performance. The Extreme Networks implementation supports multiple equal cost paths
between points and divides traffic evenly among the available paths.
EGP
Exterior Gateway Protocol is an Internet routing protocol for exchanging reachability information
between routers in different autonomous systems.
is a more recent
protocol that accomplishes this task.
ELRP
Extreme Loop Recovery Protocol is an Extreme Networks-proprietary protocol that allows you to detect
Layer 2 loops.
EMISTP
Extreme Multiple Instance Spanning Tree Protocol. This Extreme Networks-proprietary protocol uses a
unique encapsulation method for
messages that allows a physical port to
belong to multiple
EPS
Ethernet Protection Switching is defined in ITU/T G.8031.
ESRP
Extreme Standby Router Protocol is an Extreme Networks-proprietary protocol that provides redundant
Layer 2 and routing services to users.
ESS
Several
s can be joined together to form one logical
segment, referred to as an extended service set (ESS). The
is used to identify the ESS.
FDB
The switch maintains a database of all MAC address received on all of its ports and uses this information
to decide whether a frame should be forwarded or filtered. Each forwarding database (FDB) entry
consists of the MAC address of the sending device, an identifier for the port on which the frame was
received, and an identifier for the
to which the device belongs. Frames destined for
devices that are not currently in the FDB are flooded to all members of the VLAN. For some types of
entries, you configure the time it takes for the specific entry to age out of the FDB.
Glossary
ExtremeSwitching 200 Series: Administration Guide
357