Gigaset C450 IP Manual page 90

Hide thumbs Also See for C450 IP:
Table of Contents

Advertisement

M
MAC address
Media Access Control Address
Hardware address by means of which
each network device (e.g. network
card, switch, phone) can be uniquely
identified worldwide. It is composed of
six parts (hexadecimal numbers), sepa-
rated by a "-" (e.g. 00-90-65-44-00-3A).
The MAC address is assigned by the
manufacturer and cannot be changed.
Mbps
Million bits per second
Unit of the transmission speed in a net-
work.
MRU
Maximum Receive Unit
Defines the maximum user data vol-
ume within a data packet.
MTU
Maximum Transmission Unit
Defines the maximum length of a data
packet that can be carried over the net-
work at a time.
N
NAT
Network Address Translation
Method for converting (private) IP
addresses to one or more (public)
IP addresses. NAT enables the IP
addresses of Network subscribers
(e.g. VoIP telephones) in a LAN to be
concealed behind a shared IP address
for the Router on the Internet.
VoIP telephones behind a NAT router
cannot be reached by VoIP servers (on
account of the private IP address). In
order to "get around" NAT, it is possible
to use (alternatively) ALG in the router,
STUN in the VoIP telephone, or for the
VoIP provider to use an Outbound
proxy.
If an outbound proxy is made available
you must allow for this in the VoIP set-
tings for your phone.
Network
Group of devices. Devices can be con-
nected in either wired or wireless
mode.
Networks can also differ in range and
structure:
– Range: local networks (LAN) or
wide-area networks (WAN)
– Structure: Infrastructure network
or Ad-hoc network
Network subscribers
Devices and computers that are con-
nected to each other in a network, e.g.
servers, PCs and phones.
O
Outbound proxy
Alternative NAT control mechanism to
STUN and ALG.
Outbound proxies are implemented by
the VoIP provider in Firewall/NAT envi-
ronments as an alternative to SIP Proxy
Server. They control data traffic
through the firewall.
Outbound proxy and STUN servers
should not be used simultaneously.
See also: STUN and NAT.
P
PIN
Personal Identification Number
Protects against unauthorised use.
When the PIN is activated a number
combination has to be entered in order
to access a protected area.
You can protect your base station con-
figuration data with a system PIN (4-
digit number combination).
Port
Data is exchanged between two appli-
cations in a Network across a port.
Glossary
87

Advertisement

Table of Contents
loading

Table of Contents