– 595 –
Glossary
ACL
Access Control List. ACLs can limit network traffic and restrict access to certain users or
devices by checking each packet for certain IP or MAC (i.e., Layer 2) information.
ARP
Address Resolution Protocol converts between IP addresses and MAC (hardware) addresses.
ARP is used to locate the MAC address corresponding to a given IP address. This allows the
switch to use IP addresses for routing decisions and the corresponding MAC addresses to
forward packets from one hop to the next.
BOOTP
Boot Protocol i
s
used to provide bootup information for network devices, including IP
address information, the address of the TFTP server that contains the devices system files,
and the name of the boot file.
CFM
Connectivity Fault Management provides fault monitoring for end-to-end
connections within a designated service area by using continuity check messages
which can detect faults in maintenance points, fault verification through loop back
messages, and fault isolation with link trace messages.
CoS
Class of Service is supported by prioritizing packets based on the required level of service,
and then placing them in the appropriate output queue. Data is transmitted from the
queues using weighted round-robin service to enforce priority service and prevent
blockage of lower-level queues. Priority may be set according to the port default, the
packet’s priority bit (in the VLAN tag), TCP/UDP port number, IP Precedence bit, or DSCP
priority bit.
DHCP
Dynamic Host Control Protocol. Provides a framework for passing configuration information
to hosts on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the
capability of automatic allocation of reusable network addresses and additional
configuration options.
DHCP Snooping
A technique used to enhance network security by snooping on DHCP server messages to
track the physical location of hosts, ensure that hosts only use the IP addresses assigned to
them, and ensure that only authorized DHCP servers are accessible.
Содержание EX-3524
Страница 2: ......
Страница 28: ...Figures 28 ...
Страница 34: ...Section I Getting Started 34 ...
Страница 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Страница 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Страница 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Страница 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Страница 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Страница 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Страница 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Страница 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Страница 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Страница 366: ...Chapter 15 Address Table Commands 366 ...
Страница 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Страница 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Страница 578: ...Section I Appendices 578 ...
Страница 594: ...Appendix C Customer Support Manuals 594 ...