EasyManuals Logo

EXTREME SWITCHING ISW 4-10/100P User Manual

EXTREME SWITCHING ISW 4-10/100P
167 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #155 background imageLoading...
Page #155 background image
Data Center Bridging is a set of IEEE 802.1Q extensions to standard Ethernet, that provide an
operational framework for unifying Local Area Networks (LAN), Storage Area Networks (SAN) and
Inter-Process Communication (IPC) trac between switches and endpoints onto a single transport
layer.
DHCP
Dynamic Host Configuration Protocol allows network administrators to centrally manage and automate
the assignment of IP addresses on the corporate network. DHCP sends a new IP address when a
computer is plugged into a dierent place in the network. The protocol supports static or dynamic IP
addresses and can dynamically reconfigure networks in which there are more computers than there are
available IP addresses.
DoS attack
Denial of Service attacks occur when a critical network or computing resource is overwhelmed so that
legitimate requests for service cannot succeed. In its simplest form, a DoS attack is indistinguishable
from normal heavy trac. ExtremeXOS software has configurable parameters that allow you to defeat
DoS attacks.
DSSS
Direct-Sequence Spread Spectrum is a transmission technology used in Local Area Wireless Network
(LAWN) transmissions where a data signal at the sending station is combined with a higher data rate bit
sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping
code is a redundant bit pattern for each bit that is transmitted, which increases the signal's resistance to
interference. If one or more bits in the pattern are damaged during transmission, the original data can
be recovered due to the redundancy of the transmission. (Compare with FHSS (Frequency-Hopping
Spread Spectrum).)
EAP-TLS/EAP-TTLS
EAP-TLS Extensible Authentication Protocol - Transport Layer Security. A general protocol for
authentication that also supports multiple authentication methods, such as token cards, Kerberos, one-
time passwords, certificates, public key authentication and smart cards.
IEEE 802.1x specifies how EAP should be encapsulated in LAN frames.
In wireless communications using EAP, a user requests connection to a WLAN (Wireless Local Area
Network) through an access point, which then requests the identity of the user and transmits that
identity to an authentication server such as RADIUS (Remote Authentication Dial In User Service) The
server asks the access point for proof of identity, which the access point gets from the user and then
sends back to the server to complete the authentication.
EAP-TLS provides for certificate-based and mutual authentication of the client and the network. It relies
on client-side and server-side certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP (Wired Equivalent Privacy) keys.
EAP-TTLS (Tunneled Transport Layer Security) is an extension of EAP-TLS to provide certificate-based,
mutual authentication of the client and network through an encrypted tunnel, as well as to generate
dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
(See also PEAP (Protected Extensible Authentication Protocol).)
EAPS
Glossary
ISW Series Managed Industrial Ethernet Switch Command Reference Guide 155

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the EXTREME SWITCHING ISW 4-10/100P and is the answer not in the manual?

EXTREME SWITCHING ISW 4-10/100P Specifications

General IconGeneral
BrandEXTREME SWITCHING
ModelISW 4-10/100P
CategoryNetwork Router
LanguageEnglish