Glossary - Motorola EX-3524 Cli Reference Manual

Layer 2 gigabit ethernet poe/poe+ switch
Hide thumbs Also See for EX-3524:
Table of Contents

Advertisement

Glossary

ACL
Access Control List. ACLs can limit network traffic and restrict access to certain users or
devices by checking each packet for certain IP or MAC (i.e., Layer 2) information.
ARP
Address Resolution Protocol converts between IP addresses and MAC (hardware) addresses.
ARP is used to locate the MAC address corresponding to a given IP address. This allows the
switch to use IP addresses for routing decisions and the corresponding MAC addresses to
forward packets from one hop to the next.
BOOTP
Boot Protocol i
used to provide bootup information for network devices, including IP
s
address information, the address of the TFTP server that contains the devices system files,
and the name of the boot file.
CFM
Connectivity Fault Management provides fault monitoring for end-to-end
connections within a designated service area by using continuity check messages
which can detect faults in maintenance points, fault verification through loop back
messages, and fault isolation with link trace messages.
CoS
Class of Service is supported by prioritizing packets based on the required level of service,
and then placing them in the appropriate output queue. Data is transmitted from the
queues using weighted round-robin service to enforce priority service and prevent
blockage of lower-level queues. Priority may be set according to the port default, the
packet's priority bit (in the VLAN tag), TCP/UDP port number, IP Precedence bit, or DSCP
priority bit.
DHCP
Dynamic Host Control Protocol. Provides a framework for passing configuration information
to hosts on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the
capability of automatic allocation of reusable network addresses and additional
configuration options.
DHCP Snooping
A technique used to enhance network security by snooping on DHCP server messages to
track the physical location of hosts, ensure that hosts only use the IP addresses assigned to
them, and ensure that only authorized DHCP servers are accessible.
– 595 –

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ex-3548

Table of Contents