TRENDnet TEW-637AP 3.01 manual Rip, Rsa, Sip, Smtp, Snmp, Soho, Spi, Ssh, Ssid, Tcp

Page 37

Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network

Reboot

To restart a computer and reload it's operating software or firmware from nonvolatile storage.

Rendezvous

Apple's version of UPnP, which allows for devices on a network to discover each other and be connected without the need to configure any settings

Repeater

Retransmits the signal of an Access Point in order to extend it's coverage

RIP

Routing Information Protocol is used to synchronize the routing table of all the APs on a network

RJ-11

The most commonly used connection method for telephones

RJ-45

The most commonly used connection method for Ethernet

RS-232C

The interface for serial communication between computers and other related devices

RSA

Algorithm used for encryption and authentication

S

Server

A computer on a network that provides services and resources to other computers on the network

Session key

An encryption and decryption key that is generated for every communication session between two computers

Session layer

The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends

Simple Mail Transfer Protocol

Used for sending and receiving email

Simple Network Management Protocol

Governs the management and monitoring of network devices

SIP

Session Initiation Protocol. A standard protocol for initiating a user session that involves multimedia content, such as voice or chat.

SMTP

Simple Mail Transfer Protocol

SNMP

Simple Network Management Protocol

SOHO

Small Office/Home Office

SPI

Stateful Packet Inspection

SSH

Secure Shell is a command line interface that allows for secure connections to remote computers

SSID

Service Set Identifier is a name for a wireless network

Stateful inspection

A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall

Subnet mask

Determines what portion of an IP address designates the Network and which part designates the Host

Syslog

System Logger -- a distributed logging interface for collecting in one place the logs from different sources. Originally written for UNIX, it is now available for other operating systems, including Windows.

T

TCP

Transmission Control Protocol

Page 37

Image 37
Contents Page FCC Radiation Exposure Statement Federal Communication Commission Interference StatementEurope EU Declaration of Conformity Page Contents Minimum System Requirements Package ContentsIntroduction FeaturesWPS Button Hardware OverviewRear View Installation Considerations Getting Started Page Page Page Page Page Page Using the Configuration Menu Network Network LAN SettingWireless Basic WirelessRepeater Mode Support WDS Mode Wireless ModeNetwork Name Ssid Multiple Ssid #Channel Bandwidth Operating ModeGuard Interval Reserve Direction Grant RDGBeacon Interval Wireless AdvancedFragment Threshold RTS ThresholdProtection IAPPInter-Access Point ProtocolFrame aggregation Msdu aggregationMAC Filter Security Group Key Update Interval WPA/WPA2 ModeWPA/WPA2-Personal and Enterprise Cipher TypeWPA/WPA2-Enterprise WPA/WPA2-PersonalWPA/WPA2 mixed environment WPS WPS modeStation List System Management AdministratorUpload Firmware Status Settings ManagementGlossary BootpAscii CATDNS DhcpEAP FTPHttp GUIHttps IcmpISP IPXLAN LEDNTP NICOfdm OSIRSA RIPSIP SmtpTftp TCP/IPUDP URLWlan WispWPA Specifications Limited Warranty PWP05202009v2