
User’s Manual of IGSW-24040T
SSH
SSH is an acronym for
S
ecure
SH
ell. It is a network protocol that allows data to be exchanged using a secure channel
between two networked devices. The encryption used by SSH provides confidentiality and integrity of data over an
insecure network. The goal of SSH was to replace the earlier rlogin, TELNET and rsh protocols, which did not provide
strong authentication or guarantee confidentiality (Wikipedia).
SSM
SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication.
STP
S
panning
T
ree
P
rotocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The
original STP protocol is now obsoleted by RSTP.
SyncE
SyncE Is an abbreviation for Synchronous Ethernet. This functionality is used to make a network 'clock frequency'
synchronized. Not to be confused with real time clock synchronized (IEEE 1588).
T
T
erminal
A
cess
C
ontroller
A
ccess
C
ontrol
S
ystem
P
lus. It is a networking protocol which
provides access control for routers, network access servers and other networked computing devices via one or more
centralized servers. provides separate authentication, authorization and accounting services.
Tag Priority
Tag Priority is a 3-bit field storing the priority level for the 802.1Q frame.
TCP
TCP is an acronym for
T
ransmission
C
ontrol
P
rotocol. It is a communications protocol that uses the Internet Protocol
(IP) to exchange the messages between computers.
The TCP protocol guarantees reliable and in-order delivery of data from sender to receiver and distinguishes data for
multiple connections by concurrent applications (for example, Web server and e-mail server) running on the same
host.
The applications on networked hosts can use TCP to create connections to one another. It is known as a
connection-oriented protocol, which means that a connection is established and maintained until such time as the
message or messages to be exchanged by the application programs at each end have been exchanged. TCP is
responsible for ensuring that a message is divided into the packets that IP manages and for reassembling the packets
back into the complete message at the other end.
Common network applications that use TCP include the World Wide Web (WWW), e-mail, and File Transfer Protocol
(FTP).
516
Содержание IGSW-24040T
Страница 130: ...User s Manual of IGSW 24040T Figure 4 6 10 Port 1 Port 6 VLAN Configuration 130 ...
Страница 150: ...User s Manual of IGSW 24040T 150 Figure 4 7 10 MST1 MSTI Port Configuration Page Screenshot ...
Страница 156: ...User s Manual of IGSW 24040T Figure 4 8 2 Multicast Flooding Figure 4 8 3 IGMP Snooping Multicast Stream Control 156 ...
Страница 188: ...User s Manual of IGSW 24040T Figure 4 9 14 Voice VLAN Configuration Page Screenshot 188 ...
Страница 212: ...User s Manual of IGSW 24040T Figure 4 11 4 Network Access Server Configuration Page Screenshot 212 ...
Страница 249: ...User s Manual of IGSW 24040T Figure 4 12 1 Port Limit Control Configuration Overview Page Screenshot 249 ...
Страница 308: ...User s Manual of IGSW 24040T 308 ...
Страница 337: ...User s Manual of IGSW 24040T NAS No MVR No Voice VLAN No MSTP No Combined Enabled 1 All Disabled Untag This 1 No 337 ...
Страница 412: ...User s Manual of IGSW 24040T Example Show RADIUS statistics SWITCH security aaa statistics 412 ...
Страница 434: ...User s Manual of IGSW 24040T Parameters vid VLAN ID 1 4095 Default Setting disable 434 ...
Страница 465: ...User s Manual of IGSW 24040T Example Enable the mirror mode for port 1 4 SWITCH mirror mode 1 4 enable 465 ...