Edge-Core AS6700-32X Cli Reference Manual page 1089

10g/40g top-of-rack switches
Hide thumbs Also See for AS6700-32X:
Table of Contents

Advertisement

SSH
Secure Shell is a secure replacement for remote access functions, including Telnet. SSH can
authenticate users with a cryptographic key, and encrypt data connections between
management clients and the switch.
STA
Spanning Tree Algorithm is a technology that checks your network for any loops. A loop can
often occur in complicated or backup linked network systems. Spanning Tree detects and
directs data along the shortest available path, maximizing the performance and efficiency
of the network.
TACACS+
Terminal Access Controller Access Control System Plus. TA
protocol that uses software running on a central server to control access to TACACS-
compliant devices on the network.
TCP/IP
Transmission Control Protocol/Internet Protocol. Protocol suite that includes TCP as the
primary transport protocol, and IP as the network layer protocol.
Telnet
Defines a remote communication facility for interfacing to a terminal device over TCP/IP.
TFTP
Trivial File Transfer Protocol. A TCP/IP protocol commonly used for software downloads.
UDP
User Datagram Protocol. UD
communications. It uses IP as the underlying transport mechanism to provide access to IP-
like services. UDP packets are delivered just like IP packets – connection-less datagrams that
may be discarded before reaching their targets. UDP is useful when TCP would be too
complex, too slow, or just unnecessary.
UTC
Universal Time Coordinate. UTC is a time scale that couples Greenwich Mean Time (based
solely on the Earth's rotation rate) with highly accurate atomic time. The UTC does not have
daylight saving time.
VLAN
Virtual LAN. A Virtual LAN is a collection of network nodes that share the same collision
domain regardless of their physical location or connection point in the network. A VLAN
serves as a logical workgroup with no physical barriers, and allows users to share
information and resources as though located on the same LAN.
VRRP
Virtual Router Redundancy Protocol uses a virtual IP address to support a primary router
and multiple backup routers. The backups can be configured to take over the workload if
the master fails or to load share the traffic. The primary goal of VRRP is to allow a host device
which has been configured with a fixed gateway to maintain network connectivity in case
the primary gateway goes down.
provides a datagram mode for packet-switched
P
– 1089 –
Glossary
is a logon authentication
CACS+

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

As5700-54x

Table of Contents