Appendix
B.3 Glossary
SCALANCE W1750D UI
568
Configuration Manual, 02/2018, C79000-G8976-C451-02
Term
Definition
POE
Power over Ethernet (PoE) is a method of delivering power on the same
physical Ethernet wire used for data communication. Power for devices is
provided in one of the following two ways:
•
Endspan— The switch that an AP is connected for power supply.
•
Midspan— A device can sit between the switch and APs
The choice of endspan or midspan depends on the capabilities of the
switch to which the AP is connected. Typically if a switch is in place and
does not support PoE, midspan power injectors are used.
PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) is a method of connecting to
the Internet typically used with DSL services where the client connects to
the DSL modem.
QoS
Quality of Service (QoS) refers to the capability of a network to provide
better service to a specific network traffic over various technologies.
RF
Radio Frequency (RF) refers to the portion of electromagnetic spectrum in
which electromagnetic waves are generated by feeding alternating current
to an antenna.
TACACS
Family of protocols that handle remote authentication and related services
for network access control through a centralized server.
Derived from TACACS but an entirely new and separate protocol to handle
AAA services. uses TCP and is not compatible with TACACS.
Because it encrypts password, username, authorization, and accounting, it
is less vulnerable than RADIUS.
VPN
A Virtual Private Network (VPN) network that uses a public telecommunica-
tion infrastructure, such as the Internet, to provide remote offices or individ-
ual users with secure access to their organization's network. A VPN
ensures privacy through security procedures and tunneling protocols such
as the Layer Two Tunneling Protocol ( L2TP ). Data is encrypted at the
sending end and decrypted at the receiving end.
WEP
Wired equivalent privacy (WEP) is a security protocol specified in 802.11b,
designed to provide a WLAN with a level of security and privacy compara-
ble to what is usually expected of a wired LAN. Data encryption protects the
vulnerable wireless link between clients and access points; once this
measure has been taken, other typical LAN security mechanisms such as
password protection, end-to-end encryption,
virtual private networks (VPNs), and authentication can be put in place to
ensure privacy.
wireless
Describes telecommunications in which electromagnetic waves (rather than
some form of wire) carry the signal over part or all of the communication
path.
wireless network
In a Wireless LAN (WLAN), laptops, desktops, PDAs, and other computer
peripherals are connected to each other without any network cables.
These network elements or clients use radio signals to communicate with
each other. Wireless networks are set up based on the IEEE 802.11 stand-
ards.
Содержание SCALANCE W1750D UI
Страница 18: ...About this guide SCALANCE W1750D UI 18 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 28: ...About SCALANCE W 3 3 SCALANCE W CLI SCALANCE W1750D UI 28 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 108: ...IPv6 Support 10 4 Debugging Commands SCALANCE W1750D UI 108 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 326: ......
Страница 356: ......
Страница 374: ......
Страница 416: ......
Страница 440: ......
Страница 450: ...Intrusion Detection 27 4 Configuring IDS SCALANCE W1750D UI 450 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 470: ......
Страница 480: ......
Страница 496: ......
Страница 518: ...Hotspot Profiles 33 3 Sample Configuration SCALANCE W1750D UI 518 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 528: ......
Страница 552: ......
Страница 570: ...Appendix B 3 Glossary SCALANCE W1750D UI 570 Configuration Manual 02 2018 C79000 G8976 C451 02 ...