HP ProCurve 7000dl Series Basic Management And Configuration Manual page 867

Procurve 7000dl series secure router
Hide thumbs Also See for ProCurve 7000dl Series:
Table of Contents

Advertisement

Telnet TELephone NETwork. A TCP/IP protocol/program. The purpose of the Telnet
Protocol is to provide a fairly general, bi-directional, 8-bit byte-oriented com-
munications facility. It is typically used to provide user-oriented command line
login sessions between hosts on the Internet. The name "Telnet" came about
because the protocol was designed to emulate a single terminal attached to
the other computer. For more information about the Telnet protocol, see RFC
854 (at http://www.ietf.org/rfc/rfc0854.txt).
TE1 Terminal Equipment 1. Equipment that can be directly connected to the ISDN
line (often using an S/ T Interface). Examples include ISDN phones, routers,
ISDN computers, digital phones, and digital fax machines.
TE2 Terminal Equipment 2. ISDN equipment that requires a connection to a TA
before being connected to the NT1 or NT2. Examples are PCs with EIA 232
interfaces and analog telephones and fax machines.
TFTP Trivial File Transfer Protocol. A protocol that uses UDP to transmit and
receive files and provides no security features. TFTP is often used by servers
to boot diskless workstations, X-terminals, and routers. It can also be used as
a file server. For more information about TFTP, see RFC 1350 (at http://
www.ietf.org/rfc/rfc1350.txt).
Timeslot A placeholder for network traffic; a window of time that can be reserved for
a particular transmission. Because channels in T1/E1 connections use TDM,
channels are considered timeslots since each channel gets an equal amount
of time to transmit.
ToS Type of Service. An 8-bit header field in IPv4 packets, which allows you to
mark traffic for special handling. Two standards define how the ToS field
defines traffic: IP precedence, the original standard for using this field, and
DiffServ. For more information about the ToS field in the IP header, see the
RFC 791 on IP (at http://www.ietf.org/rfc/rfc0791.txt). See also IP precedence
and DiffServ.
Transform Set A combination of security protocols, algorithms, and other settings that will
be applied to IPSec-protected traffic. During the IPSec SA negotiation, the
VPN peers agree to use a particular transform set when protecting a particular
data flow. See also SA.
Transport Layer Layer 4 of the OSI model. The purpose of the Transport Layer is to provide
transparent data transfer between end users. This layer is also responsible for
end-to-end error recovery and flow control.
Tunnel A virtual point-to-point connection in which data is encrypted and encapsu-
lated at one endpoint for secure transmission across a public or untrusted
network, and de-encapsulated and decrypted at the receiving endpoint.
Appendix B: Glossary
B-53

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve 7102dlProcurve 7103dlJ8752aJ8753a

Table of Contents