EasyManuals Logo

EXTREME SWITCHING ISW 4-10/100P User Manual

EXTREME SWITCHING ISW 4-10/100P
167 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #156 background imageLoading...
Page #156 background image
Extreme Automatic Protection Switching is an Extreme Networks-proprietary version of the Ethernet
Automatic Protection Switching protocol that prevents looping Layer 2 of the network. This feature is
discussed in RFC 3619.
ECMP
Equal Cost Multi Paths is a routing algorithm that distributes network trac across multiple high-
bandwidth OSPF (Open Shortest Path First), BGP (Border Gateway Protocol), IS-IS, and static routes to
increase performance. The Extreme Networks implementation supports multiple equal cost paths
between points and divides trac evenly among the available paths.
EGP
Exterior Gateway Protocol is an Internet routing protocol for exchanging reachability information
between routers in dierent autonomous systems. BGP (Border Gateway Protocol) is a more recent
protocol that accomplishes this task.
ELRP
Extreme Loop Recovery Protocol is an Extreme Networks-proprietary protocol that allows you to detect
Layer 2 loops.
EMISTP
Extreme Multiple Instance Spanning Tree Protocol. This Extreme Networks-proprietary protocol uses a
unique encapsulation method for STP (Spanning Tree Protocol) messages that allows a physical port to
belong to multiple STPD (Spanning Tree Domain)s.
EPS
Ethernet Protection Switching is defined in ITU/T G.8031.
ERPS
Ethernet Ring Protection Switching provides fast protection and recovery switching for Ethernet trac
in a ring topology. It also ensures that the Ethernet layer remains loop-free. It is defined in ITU/T G.8032.
ESRP
Extreme Standby Router Protocol is an Extreme Networks-proprietary protocol that provides redundant
Layer 2 and routing services to users.
ESS
Several BSS (Basic Service Set)s can be joined together to form one logical WLAN (Wireless Local Area
Network) segment, referred to as an extended service set (ESS). The SSID is used to identify the ESS.
Extreme Access Control
EAC, formerly NAC
, featuring both physical and virtual appliances, is a pre- and post-connect solution
for wired and wireless LAN and VPN users. Using Identity and Access appliances and/or Identity and
Access Virtual Appliance with the EMC (Extreme Management Center) software, you can ensure only
the right users have access to the right information from the right place at the right time. EAC is tightly
integrated with the Intrusion Prevention System (IPS) and Security Information and Event Manager
(SIEM) to deliver best-in-class post-connect access control. Learn more about EAC at http://
www.extremenetworks.com/product/extreme-access-control/.
Extreme Application Analytics
Glossary
ISW Series Managed Industrial Ethernet Switch Command Reference Guide 156

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the EXTREME SWITCHING ISW 4-10/100P and is the answer not in the manual?

EXTREME SWITCHING ISW 4-10/100P Specifications

General IconGeneral
BrandEXTREME SWITCHING
ModelISW 4-10/100P
CategoryNetwork Router
LanguageEnglish