EasyManuals Logo

KeeNetic Lite KN-1310 User Manual

KeeNetic Lite KN-1310
320 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #295 background imageLoading...
Page #295 background image
value that is suitable for most users. In general, Internet users should
follow the advice of their Internet service provider (ISP) about whether
to change the default value and what to change it to.
Network Access Control List rules that are applied to IP interfaces that are available on a router,
each with a list of hosts or networks that are permitted or denied to
use the service. Access control lists can be congured to control both
inbound and outbound trafc.
Network Time Protocol is a protocol that is used to synchronize computer clock times in a
network of computers. Developed by David Mills at the University of
Delaware, NTP is now an Internet standard. In common with similar
protocols, NTP uses Coordinated Universal Time (UTC) to synchronize
computer clock times to a millisecond, and sometimes to a fraction of
a millisecond.
Network Trafc
Classication Engine
also DPI, Deep Deep Packet Inspection
is a form of computer network packet ltering that examines the data
part (and possibly also the header) of a packet as it passes an inspection
point, searching for protocol non-compliance, viruses, spam, intrusions,
or dened criteria to decide whether the packet may pass or if it needs
to be routed to a different destination, or, for the purpose of collecting
statistical information.
Deep Packet Inspection (and ltering) enables advanced network
management, user service, and security functions as well as internet
data mining, eavesdropping, and internet censorship. Although DPI
technology has been used for Internet management for many years,
some advocates of net neutrality fear that the technology may be used
anticompetitively or to reduce the openness of the Internet.
Open Package lightweight package management system. It is intended for use on
embedded Linux devices and is used in this capacity in the OpenWrt
1
and Entware
2
projects. Opkg packages use the .ipk extension.
Password Authentication
Protocol
is an authentication protocol that uses a password. PAP is used by
Point-to-Point Protocol to validate users before allowing them access to
the remote network. PAP transmits unencrypted ASCII passwords over
the network and is therefore considered insecure.
Perfect Forward Secrecy is a property of secure communication protocols: a secure
communication protocol is said to have forward secrecy if compromise
of long-term keys does not compromise past session keys. PFS protects
past sessions against future compromises of secret keys or passwords.
Ping Check performs ICMP and TCP based tests to verify if the internet connection
is working ne. Test results may be used to switch between primary
and backup connections.
Point-to-Point Protocol is a protocol used to establish a direct connection between two nodes.
It can provide connection authentication, transmission encryption, and
1
https://www.openwrt.org/
2
https://github.com/Entware-ng/Entware-ng
Keenetic Lite (KN-1310) Command Reference Guide
295
Glossary

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the KeeNetic Lite KN-1310 and is the answer not in the manual?

KeeNetic Lite KN-1310 Specifications

General IconGeneral
BrandKeeNetic
ModelLite KN-1310
CategoryNetwork Router
LanguageEnglish

Related product manuals