beautypg.com

Interlogix NS3702-24P-4S User Manual User Manual

Page 387

background image

387

See the Web Page help text for each specific port property.

ACL|Rate Limiters

: Under this Page you can configure the rate limiters. There can be 15 different rate limiters, each

ranging from 1-1024K packets per seconds. Under "Ports" and "Access Control List" web-Pages you can assign a Rate

Limiter ID to the ACE(s) or ingress port(s).

AES

AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to

improve WLAN security. It is an encryption standard by the U.S. government, which will replace DES and 3DES. AES has

a fixed block size of 128 bits and a key size of 128, 192, or 256 bits.

AMS

AMS is an acronym for Auto Media Select. AMS is used for dual media ports (ports supporting both copper (cu) and fiber

(SFP) cables. AMS automatically determines if a SFP or a CU cable is inserted and switches to the corresponding media. If

both SFP and cu cables are inserted, the port will select the prefered media.

APS

APS is an acronym for Automatic Protection Switching. This protocol is used to secure that switching is done bidirectional

in the two ends of a protection group, as defined in G.8031.

Aggregation

Using multiple ports in parallel to increase the link speed beyond the limits of a port and to increase the redundancy for

higher availability.

(Also Port Aggregation, Link Aggregation).

ARP

ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP address into a physical

address, such as an Ethernet address. ARP allows a host to communicate with other hosts when only the Internet address

of its neighbors is known. Before using IP, the host sends a broadcast ARP request containing the Internet address of the

desired destination system.

ARP Inspection

ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer

2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and

responses can go through the switch device.