D-Link DWS-3250 Product Manual - Page 331

TFTP Trivial File Transfer Protocol, Simple Network Time Protocol, Transport Control Protocol

Page 331 highlights

DXS/DWS 3200 Series User Guide Feature SNTP Spanning Tree Protocol SSH 2.0 SSL 3.0 Static MAC Entries TACACS+ TCP TFTP Trivial File Transfer Protocol Traceroute Virtual Cable Testing Description The Simple Network Time Protocol (SNTP) assures accurate network Ethernet Switch clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. Time sources are established by Stratums. Stratums define the distance from the reference clock. The higher the stratum (where zero is the highest), the more accurate the clock. 802.1d Spanning tree is a standard Layer 2 switch requirement that allows bridges to automatically prevent and resolve L2 forwarding loops. Switches exchange configuration messages using specifically formatted frames and selectively enable and disable forwarding on ports. Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH version 2 is currently supported. The SSH server feature enables an SSH client to establish a secure, encrypted connection with a device. This connection provides functionality that is similar to an inbound telnet connection. SSH uses RSA and DSA Public Key cryptography for device connections and authentication. Secure Socket Layer (SSL) is an application-level protocol that enables secure transactions of data through privacy, authentication, and data integrity. It relies upon certificates and public and private keys. MAC entries can be manually entered in the Bridging Table, as an alternative to learning them from incoming frames. These userdefined entries are not subject to aging, and are preserved across resets and reboots. TACACS+ provides centralized security for validation of users accessing the device. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes. Transport Control Protocol (TCP). TCP connections are defined between 2 ports by an initial synchronization exchange. TCP ports are identified by an IP address and a 16-bit port number. Octets streams are divided into TCP packets, each carrying a sequence number. The device supports boot image, software and configuration upload/download via TFTP. Traceroute discovers IP routes that packets were forwarded along during the forwarding process. The CLI Traceroute utility can be executed from either the user-exec or privileged modes. VCT detects and reports copper link cabling occurrences, such as open cables and cable shorts. Page 330

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

DXS/DWS 3200 Series User Guide
Page 330
SNTP
The
Simple Network Time Protocol
(SNTP) assures accurate net-
work Ethernet Switch clock time synchronization up to the milli-
second. Time synchronization is performed by a network SNTP
server. Time sources are established by Stratums. Stratums
define the distance from the reference clock. The higher the stra-
tum (where zero is the highest), the more accurate the clock.
Spanning Tree Protocol
802.1d Spanning tree is a standard Layer 2 switch requirement
that allows bridges to automatically prevent and resolve L2 for-
warding loops. Switches exchange configuration messages using
specifically formatted frames and selectively enable and disable
forwarding on ports.
SSH 2.0
Secure Shell (SSH) is a protocol that provides a secure, remote
connection to a device. SSH version 2 is currently supported. The
SSH server feature enables an SSH client to establish a secure,
encrypted connection with a device. This connection provides
functionality that is similar to an inbound telnet connection. SSH
uses RSA and DSA Public Key cryptography for device connec-
tions and authentication.
SSL 3.0
Secure Socket Layer (SSL) is an application-level protocol that
enables secure transactions of data through privacy, authentica-
tion, and data integrity. It relies upon certificates and public and
private keys.
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an
alternative to learning them from incoming frames. These user-
defined entries are not subject to aging, and are preserved across
resets and reboots.
TACACS+
TACACS+ provides centralized security for validation of users
accessing the device. TACACS+ provides a centralized user
management system, while still retaining consistency with
RADIUS and other authentication processes.
TCP
Transport Control Protocol
(TCP). TCP connections are defined
between 2 ports by an initial synchronization exchange. TCP
ports are identified by an IP address and a 16-bit port number.
Octets streams are divided into TCP packets, each carrying a
sequence number.
TFTP Trivial File Transfer Protocol
The device supports boot image, software and configuration
upload/download via TFTP.
Traceroute
Traceroute discovers IP routes that packets were forwarded
along during the forwarding process. The CLI Traceroute utility
can be executed from either the user-exec or privileged modes.
Virtual Cable Testing
VCT
detects and reports copper link cabling occurrences, such as
open cables and cable shorts.
Feature
Description