Cisco ASR 9000 Getting Started Manual page 173

Services router
Hide thumbs Also See for ASR 9000:
Table of Contents

Advertisement

Chapter
shortest path first. Routing algorithm that iterates on length of path to determine a shortest-path
SPF
spanning tree. Commonly used in link-state routing algorithms. Sometimes called Dijkstra's algorithm.
Secure Shell. A protocol that provides a secure remote connection to a router through a Transmission
SSH
Control Protocol (TCP) application.
secure socket layer. A secure socket between two entities with authentication.
SSL
Denotes an inactive card or process that waits to become active; standby cards or processes are also
standby
sometimes denoted as backup.
The router configuration designated to be applied on the next router startup.
startup
configuration
subinterface
Virtual interfaces created on a hardware interface. These software-defined interfaces allow for
segregation of traffic into separate logical channels on a single hardware interface and better utilization
of the available bandwidth on the physical interface.
A switch between the active and standby cards. The switchover can be initiated by command, or it can
switchover
occur automatically when the active card fails.
Reload of a router node.
system reload
Soft reset of a router node. This involves restarting all processes running on that node.
system restart
T
Cisco Technical Assistance Center.
TAC
Terminal Access Controller Access Control System. Authentication protocol, developed by the DDN
TACACS
community, that provides remote access authentication and related services, such as event logging.
User passwords are administered in a central database rather than in individual routers, providing an
easily scalable network security solution.
A tar file is a file produced by the UNIX tar program, which packages multiple files in a single file for
tar
distribution as a single unit. Each tar file has a tar filename extension.
A "two-stage" configuration of the Cisco IOS XR software running configuration. This allows users to
target configuration
make changes to the running configuration and accept these changes by entering the commit command.
An identifier that determines user access to a given command or series of commands. A user must be
task ID
a member of a group with the appropriate task IDs assigned to it to execute the related commands.
terabits per second. The amount of data that can be sent in a fixed amount of time. 1 terabit = 2
Tbps
or 1,099,511,627,776 bits.
Transmission Control Protocol. Connection-oriented transport layer protocol that provides reliable
TCP
full-duplex data transmission. TCP is part of the TCP/IP protocol stack.
Standard terminal emulation protocol in the TCP/IP protocol stack. Telnet is used for remote terminal
Telnet
connection, enabling users to log in to remote systems and use resources as if they were connected to
a local system. Telnet is defined in RFC 854.
OL-28417-02
Cisco ASR 9000 Series Aggregation Services Router Getting Started Guide
40
bits,
169

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents