KTI Networks KGS-1064-HP User Manual page 222

Web management interface
Hide thumbs Also See for KGS-1064-HP:
Table of Contents

Advertisement

past the ACE matching without getting matched. In that case a counter associated with that
port is incremented. See the Web page help text for each specific port property.
ACL|Rate Limiters: Under this page you can configure the rate limiters. There can be 15
different rate limiters, each ranging from 1-1024K packets per seconds. Under "Ports" and
"Access Control List" web-pages you can assign a Rate Limiter ID to the ACE(s) or ingress
port(s).
AES
AES
is an acronym for Advanced Encryption Standard. The encryption key protocol is applied
in 802.1i standard to improve WLAN security. It is an encryption standard by the U.S.
government, which will replace DES and 3DES. AES has a fixed block size of 128 bits and a
key size of 128, 192, or 256 bits.
AMS
AMS
is an acronym for Auto Media Select. AMS is used for dual media ports (ports
supporting both copper (cu) and fiber (SFP) cables. AMS automatically determines if a SFP or
a CU cable is inserted and switches to the corresponding media. If both SFP and cu cables are
inserted, the port will select the prefered media.
APS
APS
is an acronym for Automatic Protection Switching. This protocol is used to secure that
switching is done bidirectional in the two ends of a protection group, as defined in G.8031.
Aggregation
Using multiple ports in parallel to increase the link speed beyond the limits of a port and to
increase the redundancy for higher availability.
(Also Port Aggregation, Link Aggregation).
ARP
ARP
is an acronym for Address Resolution Protocol. It is a protocol that used to convert an
address into a physical address, such as an Ethernet address. ARP allows a host to
communicate with other hosts when only the Internet address of its neighbors is known.
Before using IP, the host sends a broadcast ARP request containing the Internet address of the
desired destination system.
ARP Inspection
ARP Inspection
devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to
block such attacks. Only valid ARP requests and responses can go through the switch device.
Auto-Negotiation
Auto-negotiation
and the speed settings that can be shared by those devices for a link.
C
is a secure feature. Several types of attacks can be launched against a host or
is the process where two different devices establish the mode of operation
-222-
IP

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents