Tripp Lite B098048 Owners Manual for B093- B097- and B098-Series Console Serve - Page 282

Simple Mail Transfer Protocol. The console server includes SMTPclient, a minimal SMTP client

Page 282 highlights

APPENDIX E: Terminology TERM Router SIM SMASH SMTP SOL SSH SSL TACACS+ TCP/IP TCP/IP address Telnet UDP UTC UTP VNC VPN WAN WINS MEANING A network device that moves packets of data. A router differs from hubs and switches because it is "intelligent" and can route packets to their final destination. Subscriber Identity Module (SIM) card stores unique serial numbers and security authentication used to identify a subscriber on mobile telephony devices. Systems Management Architecture for Server Hardware is a standards-based protocols aimed at increasing productivity of the management of a data center. The SMASH Command Line Protocol (SMASH CLP) specification provides an intuitive interface to heterogeneous servers independent of machine state, operating system or OS state, system topology or access method. It is a standard method for local and remote management of server hardware using out-of-band communication. Simple Mail Transfer Protocol. The console server includes SMTPclient, a minimal SMTP client that takes an email message body and passes it on to an SMTP server (default is the MTA on the local host). Serial Over LAN (SOL) enables servers to transparently redirect the serial character stream from the baseboard universal asynchronous receiver/transmitter (UART) to and from the remote-client system over a LAN. With SOL support and BIOS redirection (to serial), remote managers can view the BIOS/POST output when powered on and reconfigured. Secure Shell is secure transport protocol based on public-key cryptography. Secure Sockets Layer is a protocol that provides authentication and encryption services between a web server and a web browser. The Terminal Access Controller Access Control System (TACACS+) security protocol is a more recent protocol developed by Cisco. It provides detailed accounting information and flexible administrative control over the authentication and authorization processes. TACACS+ allows for a single access control server (the TACACS+ daemon) to provide authentication, authorization, and accounting services independently. Each service can be tied into its own database to take advantage of other services available on that server or on the network, depending on the capabilities of the daemon. There is a draft RFC detailing this protocol. Transmission Control Protocol/Internet Protocol. The basic protocol for Internet communication. Fundamental Internet addressing method that uses the form nnn.nnn.nnn.nnn. Telnet is a terminal protocol that provides an easy-to-use method of creating terminal connections to a network. User Datagram Protocol. Coordinated Universal Time. Unshielded Twisted Pair cabling. A type of Ethernet cable that can operate up to 100Mb/s. Also known as Category 5 or Cat5. Virtual Network Computing (VNC) is a desktop protocol to remotely control another computer. It transmits the keyboard presses and mouse clicks from one computer to another, relaying the screen updates back in the other direction and over a network. Virtual Private Network (VPN) is a network that uses a public telecommunication infrastructure and Internet to provide remote offices or individual users with secure access to their organization's network. Wide Area Network. Windows Internet Naming Service (WINS) manages the association of workstation names and locations with IP addresses. 282

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

282
TERM
MEANING
Router
A network device that moves packets of data. A router differs from hubs and switches because it
is "intelligent" and can route packets to their final destination.
SIM
Subscriber Identity Module (SIM) card stores unique serial numbers and security authentication
used to identify a subscriber on mobile telephony devices.
SMASH
Systems Management Architecture for Server Hardware is a standards-based protocols aimed
at increasing productivity of the management of a data center. The SMASH Command Line
Protocol (SMASH CLP) specification provides an intuitive interface to heterogeneous servers
independent of machine state, operating system or OS state, system topology or access method.
It is a standard method for local and remote management of server hardware using out-of-band
communication.
SMTP
Simple Mail Transfer Protocol. The console server includes SMTPclient, a minimal SMTP client
that takes an email message body and passes it on to an SMTP server (default is the MTA on the
local host).
SOL
Serial Over LAN (SOL) enables servers to transparently redirect the serial character stream from
the baseboard universal asynchronous receiver/transmitter (UART) to and from the remote-client
system over a LAN. With SOL support and BIOS redirection (to serial), remote managers can view
the BIOS/POST output when powered on and reconfigured.
SSH
Secure Shell is secure transport protocol based on public-key cryptography.
SSL
Secure Sockets Layer is a protocol that provides authentication and encryption services between
a web server and a web browser.
TACACS+
The Terminal Access Controller Access Control System (TACACS+) security protocol is a more
recent protocol developed by Cisco. It provides detailed accounting information and flexible
administrative control over the authentication and authorization processes. TACACS+ allows for
a single access control server (the TACACS+ daemon) to provide authentication, authorization,
and accounting services independently. Each service can be tied into its own database to
take advantage of other services available on that server or on the network, depending on the
capabilities of the daemon. There is a draft RFC detailing this protocol.
TCP/IP
Transmission Control Protocol/Internet Protocol. The basic protocol for Internet communication.
TCP/IP address
Fundamental Internet addressing method that uses the form nnn.nnn.nnn.nnn.
Telnet
Telnet is a terminal protocol that provides an easy-to-use method of creating terminal
connections to a network.
UDP
User Datagram Protocol.
UTC
Coordinated Universal Time.
UTP
Unshielded Twisted Pair cabling. A type of Ethernet cable that can operate up to 100Mb/s. Also
known as Category 5 or Cat5.
VNC
Virtual Network Computing (VNC) is a desktop protocol to remotely control another computer.
It transmits the keyboard presses and mouse clicks from one computer to another, relaying the
screen updates back in the other direction and over a network.
VPN
Virtual Private Network (VPN) is a network that uses a public telecommunication infrastructure
and Internet to provide remote offices or individual users with secure access to their
organization's network.
WAN
Wide Area Network.
WINS
Windows Internet Naming Service (WINS) manages the association of workstation names and
locations with IP addresses.
APPENDIX E: Terminology