1135| Glossary of Terms AOS-W 6.5.3.x| User Guide
IGMP
Internet Group Management Protocol. Communications protocol used by hosts and adjacent routers on IP
networks to establish multicast group memberships.
IGMP snooping
IGMP snooping prevents multicast flooding on Layer 2 network by treating multicast traffic as broadcast
traffic. Without IGMP snooping, all streams could be flooded to all ports on that VLAN. When multicast flooding
occurs, end-hosts that happen to be in the same VLAN would receive all the streams only to be discarded
without snooping.
IGP
Interior Gateway Protocol. IGP is used for exchanging routing information between gateways within an
autonomous system (for example, a system of corporate local area networks).
IGRP
Interior Gateway Routing Protocol. IGRP is a distance vector interior routing protocol used by routers to
exchange routing data within an autonomous system.
IKE
Internet Key Exchange. IKE is a key management protocol used with IPsec protocol to establish a secure
communication channel. IKE provides additional feature, flexibility, and ease of configuration for IPsec
standard.
IKEv1
Internet Key Exchange version 1. IKEv1 establishes a secure authenticated communication channel by using
either the pre-shared key (shared secret), digital signatures, or public key encryption. IKEv1 operates in Main
and Aggressive modes. See RFC 2409.
IKEv2
Internet Key Exchange version 2. IKEv2 uses the secure channel established in Phase 1 to negotiate Security
Associations on behalf of services such as IPsec. IKEv2 uses pre-shared key and Digital Signature for
authentication. See RFC 4306.
IoT
Internet of Things. IoT refers to the internetworking of devices that are embedded with electronics, software,
sensors, and network connectivity features allowing data exchange over the Internet.
IPM
Intelligent Power Monitoring. IPM is a feature supported on certain APs that actively measures the power
utilization of an AP and dynamically adapts to the power resources.
IPS
Intrusion Prevention System. The IPS monitors a network for malicious activities such as security threats or
policy violations. The main function of an IPS is to identify suspicious activity, log the information, attempt to
block the activity, and report it.