PLANET MGSW-24160F User Manual
Page 518

User’s Manual of MGSW-24160F
SSH
between two networked devices. The encryption used by SSH provides confidentiality and integrity of data over an
insecure network. The goal of SSH was to replace the earlie
strong authentication or guarantee confidentiality (Wikipedia).
SSM
STP
S
panning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The
original STP protocol is now obsoleted by RSTP.
SyncE
synchronized. Not to be confused with real time clock synchronized (IEEE 1588).
T
TACACS+
provides access control for routers, network access servers and other networked computing devices via one or more
centralized servers. TACACS+ provides separate authentication, authorization and accounting services.
Tag Priority
Tag Priority is a 3-bit field storing the priority level for the 802.1Q frame.
TCP
TCP is an acronym for Transmission Control Protocol. It is a communications protocol that uses the Internet Protocol
(IP) to exchange the messages between computers.
The TCP protocol guarantees reliable and in-order delivery of data from sender to receiver and distinguishes data for
multiple connections by concurrent applications (for example, Web server and e-mail server) running on the same
host.
The applications on networked hosts can use TCP to create connections to one another. It is known as a
connection-oriented protocol, which means that a connection is established and maintained until such time as the
message or messages to be exchanged by the application programs at each end have been exchanged. TCP is
responsible for ensuring that a message is divided into the packets that IP manages and for reassembling the packets
back into the complete message at the other end.
Common network applications that use TCP include the World Wide Web (WWW), e-mail, and File Transfer Protocol
(FTP).
518