User's Manual

724-746-5500 | blackbox.com
724-746-5500 | blackbox.com
Page 217
LGB5028A User‘s Manual
Appendix A: Glossary
Appendix A. Glossary
A.1 Web-Based Management
ACE: ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID.
There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains
many detailed, different parameter options that are available for individual application.
ACL: ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual
users or groups permitted or denied to specific traffic objects, such as a process or a program.
Each accessible traffic object contains an identifier to its ACL. The privileges determine whether there are specific traffic object
access rights.
ACL implementations can be quite complex, for example, when the ACEs are prioritized for various situations. In networking, the
ACL refers to a list of service ports or network services that are available on a host or server, each with a list of hosts or servers
permitted or denied to use the service. ACLs can generally be configured to control inbound traffic, and in this context, they are
similar to firewalls.
There are three Web pages associated with the manual ACL configuration:
ACL (Access Control List): The Web page shows the ACEs in a prioritized way, highest (top) to lowest (bottom). The default
setting has the table is empty. An ingress frame will only get a request on one ACE even though there are more matching ACEs.
The first matching ACE will take action (permit/deny) on that frame and a counter associated with that ACE is incremented. An
ACE can be associated with a policy, one ingress port, or any ingress port (the whole switch). If an ACE policy is created, then
that policy can be associated with a group of ports under the “PortsWeb page. There are number of parameters that can be
configured with an ACE. Read the Web page help text to get further information for each of them. The maximum number of
ACEs is 64.
ACL Ports: The ACL Ports configuration is used to assign a Policy ID to an ingress port. This is useful to group ports to obey the
same traffic rules. Traffic Policy is created under the Access Control List” page. You can also set up specific traffic properties
(Action/Rate Limiter/Port copy, etc.) for each ingress port. They will only apply if the frame gets past the ACE matching without
getting matched. In that case, a counter associated with that port is incremented. See the Web page help text for each specific
port property.
ACL Rate Limiters: Under this page you can configure the rate limiters. There can be 15 different rate limiters, each ranging from
1–1024K packets per seconds. Under “Portsand “Access Control List” Web pages, you can assign a Rate Limiter ID to the
ACE(s) or ingress port(s).
AES: AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to improve
WLAN security. It is an encryption standard by the U.S. government that will replace DES and 3DES. AES has a fixed block size of
128 bits and a key size of 128, 192, or 256 bits.
APS: APS is an acronym for Automatic Protection Switching. This protocol is used to ensure that switching is bidirectional in the
two ends of a protection group, as defined in G.8031.
Aggregation: Using multiple ports in parallel to increase the link speed beyond the limits of a port and to increase the
redundancy for higher availability. (Also Port Aggregation, Link Aggregation).
ARP: ARP is an acronym for Address Resolution Protocol. It is a protocol used to convert an IP address into a physical address,
such as an Ethernet address. ARP allows a host to communicate with other hosts when only the Internet address of its neighbors
is known. Before using IP, the host sends a broadcast ARP request containing the Internet address of the desired destination
system.
ARP Inspection: ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected
to Layer 2 networks by poisoning” the ARP caches. This feature is used to block such attacks. Only valid ARP requests and
responses can go through the switch device.