Extreme Networks ExtremeSwitching ISW Series Quick Installation Manual page 28

Managed industrial ethernet switch
Table of Contents

Advertisement

from normal heavy traffic. ExtremeXOS software has configurable parameters that allow you to defeat
DoS attacks.
DSSS
Direct-Sequence Spread Spectrum is a transmission technology used in Local Area Wireless Network
(LAWN) transmissions where a data signal at the sending station is combined with a higher data rate bit
sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping
code is a redundant bit pattern for each bit that is transmitted, which increases the signal's resistance to
interference. If one or more bits in the pattern are damaged during transmission, the original data can
be recovered due to the redundancy of the transmission. (Compare with FHSS (Frequency-Hopping
Spread Spectrum).)
EAP-TLS/EAP-TTLS
EAP-TLS Extensible Authentication Protocol - Transport Layer Security. A general protocol for
authentication that also supports multiple authentication methods, such as token cards, Kerberos, one-
time passwords, certificates, public key authentication and smart cards.
IEEE 802.1x specifies how EAP should be encapsulated in LAN frames.
In wireless communications using EAP, a user requests connection to a WLAN through an access point,
which then requests the identity of the user and transmits that identity to an authentication server such
as RADIUS The server asks the access point for proof of identity, which the access point gets from the
user and then sends back to the server to complete the authentication.
EAP-TLS provides for certificate-based and mutual authentication of the client and the network. It relies
on client-side and server-side certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP keys.
EAP-TTLS (Tunneled Transport Layer Security) is an extension of EAP-TLS to provide certificate-based,
mutual authentication of the client and network through an encrypted tunnel, as well as to generate
dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
(See also PEAP (Protected Extensible Authentication Protocol).)
ESRP
Extreme Standby Router Protocol is an Extreme Networks-proprietary protocol that provides redundant
Layer 2 and routing services to users.
Extreme Access Control
EAC, formerly NAC
for wired and wireless LAN and VPN users. Using Identity and Access appliances and/or Identity and
Access Virtual Appliance with the Extreme Management Center software, you can ensure only the right
users have access to the right information from the right place at the right time. EAC is tightly
integrated with the Intrusion Prevention System (IPS) and Security Information and Event Manager
(SIEM) to deliver best-in-class post-connect access control. Learn more about EAC at
www.extremenetworks.com/product/extreme-access-control/.
Extreme Application Analytics
EAA, formerly Purview
captures and analyzes context-based application traffic to deliver meaningful intelligence about
applications, users, locations, and devices. EAA provides data to show how applications are being used.
ISW Series Managed Industrial Ethernet Switch Quick Installation Guide
, featuring both physical and virtual appliances, is a pre- and post-connect solution
, is a network powered application analytics and optimization solution that
Glossary
http://
28

Advertisement

Table of Contents
loading

Table of Contents