Edge-Core ECS4110-28T Management Manual page 1485

28/52-port gigabit ethernet layer 2+ switch
Hide thumbs Also See for ECS4110-28T:
Table of Contents

Advertisement

G
LOSSARY
Access Control List. ACLs can limit network traffic and restrict access to
ACL
certain users or devices by checking each packet for certain IP or MAC (i.e.,
Layer 2) information.
Address Resolution Protocol converts between IP addresses and MAC
ARP
(hardware) addresses. ARP is used to locate the MAC address
corresponding to a given IP address. This allows the switch to use IP
addresses for routing decisions and the corresponding MAC addresses to
forward packets from one hop to the next.
Boot Protocol i
used to provide bootup information for network devices,
BOOTP
s
including IP address information, the address of the TFTP server that
contains the devices system files, and the name of the boot file.
Connectivity Fault Management provides fault monitoring for end-to-end
CFM
connections within a designated service area by using continuity check
messages which can detect faults in maintenance points, fault verification
through loop back messages, and fault isolation with link trace messages.
Class of Service is supported by prioritizing packets based on the required
C
S
O
level of service, and then placing them in the appropriate output queue.
Data is transmitted from the queues using weighted round-robin service to
enforce priority service and prevent blockage of lower-level queues.
Priority may be set according to the port default, the packet's priority bit
(in the VLAN tag), TCP/UDP port number, IP Precedence bit, or DSCP
priority bit.
Dynamic Host Control Protocol. Provides a framework for passing
DHCP
configuration information to hosts on a TCP/IP network. DHCP is based on
the Bootstrap Protocol (BOOTP), adding the capability of automatic
allocation of reusable network addresses and additional configuration
options.
A technique used to enhance network security by snooping on DHCP server
DHCP S
NOOPING
messages to track the physical location of hosts, ensure that hosts only use
the IP addresses assigned to them, and ensure that only authorized DHCP
servers are accessible.
– 1485 –

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ecs4110-28pEcs4110-52tEcs4110-52p

Table of Contents