TP-Link TL-ER604W manual Appendix C Glossary, Glossary Description

Page 156

Appendix C Glossary

 

 

 

Glossary

 

 

Description

 

 

 

 

 

 

 

 

 

 

 

 

 

Application Level Gateway (ALG) is application specific

 

 

 

ALG Application

Layer

 

translation agent that allows an application on a host in one

 

 

 

Gateway

 

 

address realm to connect to its counterpart running on a host in

 

 

 

 

 

different realm transparently.

 

 

 

 

 

 

 

 

 

 

 

 

 

A

 

ARP Address Resolution

 

Internet protocol used to map an IP address to a MAC address.

 

 

 

Protocol

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

A security protocol that provides data authentication and

 

 

 

AHAuthentication Header

optional anti-replay services. AH is embedded in the data to be

 

 

 

 

 

 

protected (a full IP datagram).

 

 

 

 

 

 

 

 

 

DDNS Dynamic Domain

 

The capability of assigning a fixed host and domain name to a

 

 

 

Name Server

 

 

dynamic Internet IP address.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

DHCP Dynamic

Host

 

A protocol that automatically configure the TCP/IP parameters

 

 

 

Configuration Protocol

 

for the all the PCs that are connected to a DHCP server.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

A Demilitarized Zone allows one local host to be exposed to the

 

D

 

DMZDemilitarized Zone

Internet for a special-purpose service such as Internet gaming

 

 

 

 

 

 

or videoconferencing.

 

 

 

 

 

 

 

 

 

 

DNSDomain Name

 

 

An Internet Server that translates the names of websites into IP

 

 

 

Server

 

 

addresses.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

DSL (Digital Subscriber

 

A technology that allows data to be sent or received over

 

 

 

Line)

 

 

existing traditional phone lines.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ESPEncapsulating

 

 

Security protocol that provides data privacy services, optional

 

E

 

 

 

data authentication, and anti-replay services. ESP encapsulates

 

 

Security Payload

 

 

 

 

 

 

 

the data to be protected.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

F

 

FTPFile Transfer

 

 

Application protocol, part of the TCP/IP protocol stack, used for

 

 

Protocol

 

 

transferring files between network nodes.

 

 

 

 

 

 

 

 

 

 

 

 

 

G

 

GMT Greenwich

Mean

 

It is a term originally referring to mean solar time at the Royal

 

 

Time

 

 

Observatory in Greenwich, London.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

-151-

Image 156
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III Hardware Specifications 148 Application 130149 Glossary 151Package Contents Symbol Description Intended ReadersConventions Overview of this GuideOverview of the Router Features Wireless Traffic ControlSecurity Appearance Front Panel LEDs Status IndicationRear Panel System Mode NetworkStatus Page WAN Mode  NAT Mode Non-NAT Mode  Classic Mode WAN Mode 3.2 WAN1Tips Static IPWAN Static IP Following items are displayed on this screen  Static IPDynamic IP  Dynamic IPConnection Type Host NameGet IP Address by UnicastUse the following DNS ServerPPPoE WAN PPPoEPassword Active ModeSettings Keep Alive Account NameService Name ISP AddressSecondary Connection Subnet AddressGateway Address L2TP L2TP Settings 10 WAN L2TP Following items are displayed on this screenDefault Gateway SecondaryConnection  L2TP Status Pptp Pptp Settings Server IPInternet connection by the Connect or Disconnect  Pptp Status BigPond BigPond Settings 12 WAN Bigpond Following items are displayed on this screen BigPond Status ISP4 LAN 4.1 LANDhcp  Dhcp Settings Dhcp Client Dhcp Reservation Dhcp Reservation MAC Address  List of Reserved AddressSet the MAC Address for LAN port Set the MAC Address for WAN portSwitch Statistics MAC Address PortPort Mirror  StatisticsEnable Port Mirror ModeMirroring Port Mirrored PortRate Control Application Example Rate Control Port Config  Port ConfigPort Status Port Vlan Port Vlan Wireless Wireless SettingWireless Setting  Wireless Setting Wireless Parameter Description Ssid BroadcastAP Isolation SecurityWPA/WPA2 WEP Multi-SSID Key FormatHexadecimal and Ascii formats are  Multi-SSID Config  GeneralEnable/Disable Guest NetworkEncryption Group KeyAuth Type 1.3 WDS  List of GroupScan  ParameterBSSIDto be bridged Key TypeWireless Advanced  Wireless AdvancedKey : Short GIMAC Filtering Host Status  Filtering Rules Rule List User Group Group Host Status  Group Config  User ConfigUser  View Config View List of User ViewNAT Setup Advanced1 NAT One-to-One NAT  One-to-One NATMulti-Nets NAT  List of Rules Multi-Nets NAT Configuration procedure Application Example Network RequirementsVirtual Server  Virtual Server InterfaceProtocol Port Triggering  Port Triggering1.6 ALG 38 ALG Following items are displayed on this screenSetup Traffic Control323 ALG IPsec ALGControl Control all the timeLimited UpstreamBandwidth Control Session Limit Session LimitLimited Bandwidth Session List  List of Session LimitConfiguration Load BalancePolicy Routing WAN Link Backup 45 Link Backup Following items are displayed on this screenWAN Config ProtocolTiming FailoverRouting Static Route Protocol  List of Protocol47 Static Route Following items are displayed on this screen  Static Route5.2 RIP 48 RIP Following items are displayed on this screen  List of RIPRoute Table Firewall Anti ARP SpoofingIP-MAC Binding ARP Scanning  IP-MAC BindingARP List Attack Defense Enable Attack Flood DefensePacket Anomaly DefenseAccess Control MAC FilteringURL Filtering  MAC Filtering URL Filtering Rule ObjectAccess Rules Web Filtering Access Rules ServicePolicy SourceService Group on 3.3.1 GroupDestination Priority Service  List of ServiceName Dest. PortApp Control Control Rules Control Rules ApplicationVPN Database1 IKE IKE Policy62 IKE Policy Following items are displayed on this screen  IKE PolicyIKE Proposal 63 IKE Proposal Following items are displayed on this screen  IKE ProposalIPsec IPsec Policy List of IKE Proposal  IPsec Policy Policy NameLocal Subnet Policy Mode Remote SubnetRemote Gateway IKE PolicyAH Authentication Key-In ESP Authentication Key-InAH Authentication Key-Out ESP Authentication Key-OutIPsec Proposal  List of IPsec Policy IPsec IPsec Proposal  List of IPsec Proposal Protocol Media Tunnel Length of Header Authentication 3 L2TP/PPTPIPsec SA 3.1 L2TP/PPTP Tunnel  L2TP/PPTP TunnelTunnel Max ConnectionsL2TP/PPTP Server Pre-shard Key List of Configurations IP Address PoolList of L2TP/PPTP Tunnel  IP Address PoolServices PPPoE ServerGeneral 70 General Following items are displayed on this screen IP Address Pool Account  AccountIP Address Assigned Static IP AddressIs 48. If Enable Advanced Account Features is not selected, Exceptional IP List of Account Bulletin List of Account Exceptional IP Interval  E-BulletinTitle Dynamic DNS Publisher List of E-Bulletin DynDNS  Dyndns DdnsNo-IP  List of DynDNS Account No-IP Ddns PeanutHull  List of No-IP Account PeanutHull Ddns Comexe  List of PeanutHull AccountUPnP  Comexe Ddns List of Comexe Account Maintenance Admin SetupAdministrator  List of UPnP MappingLogin Parameter  AdministratorRemote Management  Remote ManagementFactory Defaults Management List of Subnet Reboot  Configuration VersionExport and Import  ExportFirmware Upgrade LicenseStatistics Interface Traffic Statistics Interface Traffic Statistics 123IP Traffic Statistics  Advanced WAN InformationDiagnostics Diagnostics Traffic Statistics  IP Traffic StatisticsOnline Detection  Ping Tracert Time PingDNS Lookup Port Displays the detected WAN port DetectionLogs  Config  List of LogsSeverity Send System LogsApplication Network RequirementsNetwork Topology Configurations Internet SettingSystem Mode System Mode Internet ConnectionVPN Setting IKE SettingSettings IPsec VPN IKE Policy IKE1IPsec Setting  IPsec Proposal IPsec Policy PFS DH1Pptp VPN Setting  IP Address Pool L2TP/PPTP Tunnel Network Management User Group Group  UserApp Control  ViewEnable Bandwidth Control 11 App RulesBandwidth Control Rule LAN WAN1Network Security LAN ARP DefenseScan and import the entries to ARP List WAN ARP Defense Set IP-MAC Binding Entry ManuallySet Attack Defense Attack Defense 20 Attack Defense 145Traffic Monitoring StatisticsPage Appendix a Hardware Specifications Environmental and PhysicalAppendix B FAQ Page Appendix C Glossary Glossary DescriptionAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb