494
SSH
SSH is an acronym for
S
ecure
SH
ell. It is a network protocol that allows data to be exchanged using a secure channel
between two networked devices. The encryption used by SSH provides confidentiality and integrity of data over an
insecure network. The goal of SSH was to replace the earlier rlogin, TELNET and rsh protocols, which did not provide
strong authentication or guarantee confidentiality (Wikipedia).
SSM
SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication.
STP
S
panning
T
ree
P
rotocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The original
STP protocol is now obsoleted by RSTP.
SyncE
SyncE Is an abbreviation for Synchronous Ethernet. This functionality is used to make a network 'clock frequency'
synchronized. Not to be confused with real time clock synchronized (IEEE 1588).
T
is an acronym for
T
erminal
A
cess
C
ontroller
A
ccess
C
ontrol
S
ystem
P
lus. It is a networking protocol which
provides access control for routers, network access servers and other networked computing devices via one or more
centralized servers. provides separate authentication, authorization and accounting services.
Tag Priority
Tag Priority is a 3-bit field storing the priority level for the 802.1Q frame.
TCP
TCP is an acronym for
T
ransmission
C
ontrol
P
rotocol. It is a communications protocol that uses the Internet Protocol (IP)
to exchange the messages between computers.
The TCP protocol guarantees reliable and in-order delivery of data from sender to receiver and distinguishes data for
multiple connections by concurrent applications (for example, Web server and e-mail server) running on the same host.
The applications on networked hosts can use TCP to create connections to one another. It is known as a
connection-oriented protocol, which means that a connection is established and maintained until such time as the
message or messages to be exchanged by the application programs at each end have been exchanged. TCP is
responsible for ensuring that a message is divided into the packets that IP manages and for reassembling the packets
back into the complete message at the other end.
Common network applications that use TCP include the World Wide Web (WWW), e-mail, and File Transfer Protocol
(FTP).
TELNET
Содержание IFS NS3550-24T/4S
Страница 1: ...P N 1072569 REV 00 05 ISS 11OCT12 IFS NS3550 24T 4S User Manual ...
Страница 37: ...User s Manual of NS3550 24T 4S 37 ...
Страница 96: ...96 Figure 4 4 6 Port Mirror Configuration Page Screenshot ...
Страница 127: ...User s Manual of NS3550 24T 4S 127 Figure 4 6 10 Port 1 Port 6 VLAN Configuration ...
Страница 151: ...User s Manual of NS3550 24T 4S 151 Figure 4 8 1 Multicast Service Figure 4 8 2 Multicast Flooding ...
Страница 184: ...184 Figure 4 9 14 Voice VLAN Configuration Page Screenshot ...
Страница 204: ...204 Figure 4 11 4 Network Access Server Configuration Page Screenshot ...
Страница 234: ...234 Figure 4 12 1 Port Limit Control Configuration Overview Page Screenshot ...
Страница 250: ...250 Click to undo any changes made locally and revert to previously saved values ...
Страница 297: ...User s Manual of NS3550 24T 4S 297 ...
Страница 388: ...388 Example Show RADIUS statistics SWITCH security aaa statistics ...
Страница 410: ...410 Parameters vid VLAN ID 1 4095 Default Setting disable ...
Страница 441: ...User s Manual of NS3550 24T 4S 441 Example Enable the mirror mode for port 1 4 SWITCH mirror mode 1 4 enable ...