BinTec RS353j User Manual page 561

Rs series
Hide thumbs Also See for RS353j:
Table of Contents

Advertisement

bintec elmeg GmbH
bintec RS Series
SHA1
Secure Hash Algorithm version 1 (SHA1) is a hash function that
generates a 160 bit hash value (checksum). See also Hash.
SHDSL
Symmetrical High-bit-rate Digital Subscriber Line. See DSL.
Shell
The shell is an input interface (e. g. command line or graphic user
interface) between computer and user.
Short hold
The short hold is the defined amount of time after which a network
connection is automatically cleared if no more data is transmitted.
SIF
With a Stateful Inspection Firewall (SIF), the routing of a data packet
is not determined only by source and destination addresses but also
using dynamic packet filtering based on the connection status.
Single phone num-
Single phone number access is a VoIP connection that is also
ber (VoIP)
known as a point-to-multipoint connection. It is used to connect VoIP
terminals. Multiple subscriber numbers (MSNs) are provided. See
also Direct dial-in (VoIP)
SIP
The Session Initiation Protocol is a network protocol for setting up a
communication session between two or more subscribers. The pro-
tocol is used for IP telephony (VoIP).
SIP provider
A SIP provider does the switching between a SIP connection and
other analogue, ISDN and VoIP connections.
SNMP
The Simple Network Management Protocol (SNMP) is used to con-
figure, control and monitor different network components (e. g.
routers, servers, etc.) from a single, central system. The network
component settings that can be changed are stored in a database –
the Management Information Base (MIB). SNMP uses UDP. The
network component receives requests to port 161 while the man-
aging system receives confirmation messages (TRAPs) at port 162.
Spatial streams
Spatial streams are data streams that are sent out at the same time
on the same frequency in the wireless LAN. The transmission rate is
multiplied as a result.
SPD
All the parameters that are set while configuring IPSec are stored in
the router in the form of databases. These are the Security Policy
Database (SPD) and the Security Association Database (SAD). The
Security Policy Database lists the forms of data traffic that are to be
secured. Factors such as the source and destination address of the
data packet are used to do this.
SRTP
The Secure Real-Time Transport Protocol (SRTP) is the variant of
Glossary
547

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rs353j-4gRs353jw

Table of Contents