A-6000 High Speed, Long Range Ethernet Wireless Bridge

 

 

Chapter 5 Glossary of Terms

 

 

 

 

10BaseT

The 10-Mbps baseband Ethernet specification that uses two pairs of

 

 

twisted-pair cabling (Category 3 or 5): one pair for transmitting data and the

 

 

 

other for receiving data.

 

 

 

 

 

ARP

 

Address Resolution Protocol is a protocol for mapping an Internet Protocol

 

 

address (IP address) to a physical machine address that is recognized in the

 

 

 

local network.

 

 

 

 

 

Authenticity

 

Proof that the information came from the person or location that reportedly sent

 

 

it. One example of authenticating software is through digital signatures.

 

 

 

 

 

Back Door

 

A deliberately planned security breach in a program. Back doors allow special

 

 

access to a computer or program. Sometimes back doors can be exploited and

 

 

 

allow a cracker unauthorized access to data.

 

 

 

 

 

Backbone

 

A high-speed line or series of connections that forms a major pathway within a

 

 

network.

 

 

 

 

 

BackOrifice

 

BackOrifice is a remote administration tool which allows a user to control a

 

 

computer across a TCP/IP connection using a simple console or GUI

 

 

 

application. BackOrifice is a potentially disastrous Trojan horse since it can

 

 

 

provide the user unlimited access to a system.

 

 

 

 

 

Bandwidth

 

This is the capacity on a link usually measured in bits-per-second (bps).

 

 

 

 

Bit

 

(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a

 

 

zero. The smallest unit of computerized data.

 

 

 

 

 

Brute Force

 

A technique used to find passwords or encryption keys. Force Hacking involves

Hacking

 

trying every possible combination of letters, numbers, etc. until the code is

 

 

 

broken.

 

 

 

 

 

Byte

 

A set of bits that represent a single character. There are 8 bits in a Byte.

 

 

 

 

Camping Out

 

Staying in a "safe" place once a hacker has broken into a system. The term

 

 

can be used with a physical location, electronic reference, or an entry point for

 

 

 

future attacks.

 

 

 

 

 

Channel

 

A specific frequency and bandwidth combination. In the present context, it

 

 

means TV channels for television services and downstream data for cable

 

 

 

modems.

 

 

 

 

 

CHAP

 

Challenge Handshake Authentication Protocol is an alternative protocol that

 

 

avoids sending passwords over the wire by using a challenge/response

 

 

 

technique.

 

 

 

 

 

Cipher Text

 

Text that has been scrambled or encrypted so that it cannot be read without

 

 

deciphering it. See Encryption

 

 

 

 

 

Client

 

A software program that is used to contact and obtain data from a Server

 

 

software program on another computer. Each Client program is designed to

 

 

 

work with one or more specific kinds of Server programs, and each Server

 

 

 

requires a specific kind of Client. A Web Browser is a specific kind of Client.

 

 

 

 

 

Cookie

 

A string of characters saved by a web browser on the user's hard disk. Many

 

 

web pages send cookies to track specific user information. Cookies can be used

 

 

 

to retain information as the user browses a web site. For example, cookies are

 

 

 

used to 'remember' the items a shopper may have in a shopping cart.

 

 

 

 

 

Countermeasure

 

Techniques, programs, or other tools that can protect your computer against

s

 

threats.

 

 

 

 

 

Cracker

 

Another term for hackers. Generally, the term cracker refers specifically to a

 

 

person who maliciously attempts to break encryption, software locks, or network

 

 

 

security.

 

 

 

 

 

Cracker Tools

 

Programs used to break into computers. Cracker tools are widely

 

 

distributed on the Internet. They include password crackers, Trojans, viruses,

 

 

 

war-dialers, and worms.

 

 

 

 

 

Cracking

 

The act of breaking into computers or cracking encryptions.

CLI commands

5-1

Page 39
Image 39
ZyXEL Communications A-6000 manual Arp, Chap

A-6000 specifications

ZyXEL Communications A-6000 is a cutting-edge networking device that has been designed to meet the demanding needs of today's digital lifestyle. This versatile and powerful device serves as a gateway for seamless connectivity, providing an efficient solution for both home and small office environments.

One of the standout features of the A-6000 is its dual-band Wi-Fi technology. Supporting both 2.4 GHz and 5 GHz bands, the device ensures optimal performance and flexibility for various applications. While the 2.4 GHz band offers extended range, the 5 GHz band provides faster speeds, which is particularly beneficial for high-bandwidth activities such as online gaming, video streaming, and large file downloads. This dual-band capability allows users to easily manage multiple devices without compromising overall network performance.

The A-6000 is equipped with advanced security protocols to safeguard user data. With built-in WPA3 encryption, the device enhances protection against unauthorized access while ensuring that sensitive information remains secure. Additionally, the A-6000 features customizable firewall settings, intrusion detection, and more, enabling businesses and individuals to maintain secure networks tailored to their unique requirements.

Another remarkable technology integrated into the A-6000 is MU-MIMO (Multi-User, Multiple Input, Multiple Output). This allows the device to communicate with multiple devices simultaneously, significantly improving network efficiency and reducing latency. As more devices connect to the network, MU-MIMO ensures that data is transmitted smoothly, providing a seamless experience for all users.

The A-6000 is designed with user-friendly management in mind. Its intuitive web interface simplifies network configuration, enabling users to set up and manage their networks effortlessly. Furthermore, the device supports mobile app management, allowing for remote monitoring and control of the network from anywhere at any time.

Another key characteristic of the ZyXEL A-6000 is its robust build quality and compact design. It not only maximizes performance but also minimizes interference, making it an ideal choice for various environments. With support for advanced technologies such as beamforming, the A-6000 enhances signal strength, providing better coverage to hard-to-reach areas.

Overall, ZyXEL Communications A-6000 stands out as a reliable and high-performance networking solution. With its combination of dual-band technology, enhanced security features, MU-MIMO support, and user-friendly management options, it is well-suited for those seeking robust connectivity in a continuously evolving digital landscape. Whether for personal use or small business applications, the A-6000 is a comprehensive device that meets modern connectivity demands with ease.