Cascade Networks Inc. 5400UNII Manual De Usuario
Release 8
Glossary
Issue 2, November 2007
Draft 5 for Regulatory Review
527
TNAF
Total number of authentication requests failed. A field in the data that
the cmd show esn command generates from the SQL database in
the Bandwidth and Authentication Manager (BAM) server. This field
indicates how many times the SM (identified by ESN in the related
data) attempted to authenticate but was denied by BAM.
the cmd show esn command generates from the SQL database in
the Bandwidth and Authentication Manager (BAM) server. This field
indicates how many times the SM (identified by ESN in the related
data) attempted to authenticate but was denied by BAM.
TNAR
Total number of authentication requests. A field in the data that the
cmd show esn
cmd show esn
command generates from the SQL database in the
Bandwidth and Authentication Manager (BAM) server. This field
indicates how many times the SM (identified by ESN in the related
data) attempted to authenticate, regardless of whether the attempt
succeeded.
indicates how many times the SM (identified by ESN in the related
data) attempted to authenticate, regardless of whether the attempt
succeeded.
Tokens
Theoretical amounts of data. See also Buckets.
TOS
8-bit field in that prioritizes data in a IP transmission. See
http://www.faqs.org/rfcs/rfc1349.html
.
TxUnderrun Field
This field displays how many transmission-underrun errors occurred
on the Ethernet controller.
on the Ethernet controller.
UDP
User Datagram Protocol. A set of Network, Transport, and Session
Layer protocols that RFC 768 defines. These protocols include
checksum and address information but does not retransmit data or
process any errors. See
Layer protocols that RFC 768 defines. These protocols include
checksum and address information but does not retransmit data or
process any errors. See
http://www.faqs.org/rfcs/rfc768.html
.
udp
User-defined type of port.
U‐NII
Unlicensed National Information Infrastructure radio frequency band,
in the 5.1-GHz through 5.8-GHz ranges.
in the 5.1-GHz through 5.8-GHz ranges.
VID
VLAN identifier. See VLAN.
VLAN
Virtual local area network. An association of devices through software
that contains broadcast traffic, as routers would, but in the switch-level
protocol.
that contains broadcast traffic, as routers would, but in the switch-level
protocol.
VPN
Virtual private network for communication over a public network.
One typical use is to connect remote employees, who are at home or
in a different city, to their corporate network over the Internet. Any of
several VPN implementation schemes is possible. With the Network
Address Translation feature (NAT) enabled, SMs on Cyclone System
Release 4.2 or later support L2TP over IPSec (Level 2 Tunneling
Protocol over IP Security) VPNs, but do not support PPTP (Point to
Point Tunneling Protocol) VPNs. With NAT disabled, SMs support all
types of VPNs.
One typical use is to connect remote employees, who are at home or
in a different city, to their corporate network over the Internet. Any of
several VPN implementation schemes is possible. With the Network
Address Translation feature (NAT) enabled, SMs on Cyclone System
Release 4.2 or later support L2TP over IPSec (Level 2 Tunneling
Protocol over IP Security) VPNs, but do not support PPTP (Point to
Point Tunneling Protocol) VPNs. With NAT disabled, SMs support all
types of VPNs.