104
105
Glossary
This glossary contains terms commonly used in Embedded Web System documentation.
Term Denition
A
Access Mode Species the method by which user access is granted to the system.
Access Prole
Allows network managers to define profiles and rules for accessing the device. Access to
management functions can be limited to user groups, which are dened by the following criteria:
• Ingress interfaces.
• Source IP address and/or Source IP subnets.
ACE
Filters in Access Control Lists (ACL) that determine which network trafc is forwarded.
ACE are based on the following criteria:
• Protocol.
• Protocol ID.
• Source Port.
• Destination Port.
• Wildcard Mask.
• Source IP Address.
• Destination IP Address.
ACL
Access Control List. Access Control Lists are used to grant, deny, or limit access to
devices, features, or applications.
Aggregated VLAN
Groups several VLANs into a single aggregated VLAN. Aggregating VLANs enables
routers to respond to ARP requests for nodes located on different sub-VLANs belonging
to the same Super VLAN. Routers respond with their MAC address.
AH
Authentication Header Protocol. Provides source host authentication and data integrity.
ARP
Address Resolution Protocol. A TCP/IP protocol that converts IP addresses into physical
addresses.
ASIC Application Specic Integrated Circuit. A custom chip designed for a specic application.
Asset Tag Species the user-dened device reference.
Authentication Prole Set of rules that enable login to and authentication of users and applications.
Auto-negotiation
Allows 10/100 Mpbs or 10/100/1000 Mbps Ethernet ports to establish for the following features:
• Duplex/ Half Duplex Mode.
• Flow Control.
• Speed.
B
Back Pressure
A mechanism used with Half Duplex mode that enables a port not to receive a message.
Backbone
The main segment of a network. Backbone types include:
• Building.
• Campus.
• Metropolitan.
• National Data.
• Telecommunications.