Black Box LGB5128A Network Hardware User Manual


 
A. Glossary of Web-based Management
A
ACE
ACE is an acronym for Access Control Entry. It describes access permission associated
with a particular ACE ID.
There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions
(permit and deny). The ACE also contains many detailed, different parameter options that
are available for individual application.
ACL
ACL is an acronym for Access Control List. It is the list table of ACEs, containing access
control entries that specify individual users or groups permitted or denied to specific traffic
objects, such as a process or a program.
Each accessible traffic object contains an identifier to its ACL. The privileges determine
whether there are specific traffic object access rights.
ACL implementations can be quite complex, for example, when the ACEs are prioritized
for various situations. In networking, the ACL refers to a list of service ports or network
services that are available on a host or server, each with a list of hosts or servers
permitted or denied to use the service. ACLs can generally be configured to control
inbound traffic, and in this context, they are similar to firewalls.
There are three Web pages associated with the manual ACL configuration:
ACL|Access Control List: The Web page shows the ACEs in a prioritized way, highest
(top) to lowest (bottom). By default, the table is empty. An ingress frame will only get a hit
on one ACE even though there are more matching ACEs. The first matching ACE will
take action (permit/deny) on that frame and a counter associated with that ACE is
incremented. An ACE can be associated with a Policy, one ingress port, or any ingress
port (the whole switch). If an ACE Policy is created then that Policy can be associated
with a group of ports under the "Ports" Web page. There are number of parameters that
can be configured with an ACE. Read the Web page help text to get further information
for each of them. The maximum number of ACEs is 64.
ACL|Ports: The ACL Ports configuration is used to assign a Policy ID to an ingress port.
This groups ports to obey the same traffic rules. Traffic Policy is created under the
“Access Control List” page. You can you also set up specific traffic properties
(Action/Rate Limiter/Port copy, etc.) for each ingress port. They will only apply if the frame
gets past the ACE matching without getting matched. In that case, a counter associated
with that port is incremented. See the Web page help text for each specific port property.
ACL|Rate Limiters: Under this page you can configure the rate limiters. There can be 15
different rate limiters, each ranging from 11024K packets per seconds. Under "Ports"
and "Access Control List" Web pages, you can assign a Rate Limiter ID to the ACE(s) or
ingress port(s).
AES
AES is an acronym for Advanced Encryption Standard. The encryption key protocol is
applied in the 802.1i standard to improve WLAN security. It is an encryption standard by
the U.S. government that will replace DES and 3DES. AES has a fixed block size of 128
bits and a key size of 128, 192, or 256 bits.
APS
APS is an acronym for Automatic Protection Switching. This protocol is used to secure
that switching is bidirectional in the two ends of a protection group, as defined in G.8031.