![KeeNetic Lite KN-1310 Скачать руководство пользователя страница 295](http://html1.mh-extra.com/html/keenetic/lite-kn-1310/lite-kn-1310_command-reference-manual_3863741295.webp)
value that is suitable for most users. In general, Internet users should
follow the advice of their Internet service provider (ISP) about whether
to change the default value and what to change it to.
Network Access Control List
rules that are applied to IP interfaces that are available on a router,
each with a list of hosts or networks that are permitted or denied to
use the service. Access control lists can be configured to control both
inbound and outbound traffic.
Network Time Protocol
is a protocol that is used to synchronize computer clock times in a
network of computers. Developed by David Mills at the University of
Delaware, NTP is now an Internet standard. In common with similar
protocols, NTP uses Coordinated Universal Time (UTC) to synchronize
computer clock times to a millisecond, and sometimes to a fraction of
a millisecond.
Network Traffic
Classification Engine
also DPI, Deep Deep Packet Inspection
is a form of computer network packet filtering that examines the data
part (and possibly also the header) of a packet as it passes an inspection
point, searching for protocol non-compliance, viruses, spam, intrusions,
or defined criteria to decide whether the packet may pass or if it needs
to be routed to a different destination, or, for the purpose of collecting
statistical information.
Deep Packet Inspection (and filtering) enables advanced network
management, user service, and security functions as well as internet
data mining, eavesdropping, and internet censorship. Although DPI
technology has been used for Internet management for many years,
some advocates of net neutrality fear that the technology may be used
anticompetitively or to reduce the openness of the Internet.
Open Package
lightweight package management system. It is intended for use on
embedded Linux devices and is used in this capacity in the
and
projects. Opkg packages use the
.ipk
extension.
Password Authentication
Protocol
is an authentication protocol that uses a password. PAP is used by
to validate users before allowing them access to
the remote network. PAP transmits unencrypted ASCII passwords over
the network and is therefore considered insecure.
Perfect Forward Secrecy
is a property of secure communication protocols: a secure
communication protocol is said to have forward secrecy if compromise
of long-term keys does not compromise past session keys. PFS protects
past sessions against future compromises of secret keys or passwords.
Ping Check
performs ICMP and TCP based tests to verify if the internet connection
is working fine. Test results may be used to switch between primary
and backup connections.
Point-to-Point Protocol
is a protocol used to establish a direct connection between two nodes.
It can provide connection authentication, transmission encryption, and
1
2
https://github.com/Entware-ng/Entware-ng
Keenetic Lite (KN-1310) — Command Reference Guide
295
Glossary
Содержание Lite KN-1310
Страница 2: ......
Страница 6: ...Command Reference Guide Keenetic Lite KN 1310 6 Contents Overview...
Страница 18: ...Command Reference Guide Keenetic Lite KN 1310 18 Table of Contents...
Страница 20: ...Command Reference Guide Keenetic Lite KN 1310 20 Chapter 1 Product Overview...
Страница 26: ...Command Reference Guide Keenetic Lite KN 1310 26 Chapter 2 Introduction to the CLI...
Страница 314: ...Command Reference Guide Keenetic Lite KN 1310 314 Appendix C SNMP MIB...