681319
96
Zoom out
Zoom in
Previous page
1/96
Next page
96
BOOTP Bootstrap Protocol an internet protocol that enables a diskless workstation to discover its own IP
address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine.
This enables the workstation to boot without requiring a hard or floppy disk drive.
TCP Transmission Control Protocol one of the main protocols in TCP/IP networks. Whereas the IP protocol
deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees
delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
TKIP Temporal Key Integrity Protocol scrambles the keys using hashing algorithm and, by adding an integrity-
checking feature, ensure that the keys haven’t been tampered with.
CCMP Counter Mode Cipher Block Chaining Message Authentication Code Protocol encryption protocol
designed for Wireless LAN products that implement the standards of the IEEE 802.11i amendment to the original
IEEE802.11 standard. CCMP is an enchanged data cryptographic encapsulation designed for data confidentiality and
based upon the Counter Mode with CBC-MAC (CCM) of the AES (Advanced Encyprion Standard) standard.
MAC Media Access Control hardware address that uniquely identifies each node of a network. In IEEE 802
networks, the Data Link Control (DCL) layer of the PSO Reference Model is divided into two sub-layers: the Logical Link
Control (LLC) layer and the Media Access Control layer. The MAC layer interfaces directly with the network medium.
Consequently, each different type of network medium requires a different MAC layer.
DMZ Demilitarized Zone a computer or small subnetwork that sits between a trusted internal network, such as
a corporate private LAN, and an untrusted external network, such as the public internet.
UDP User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Provides
very few error recovery services, offering instead a direct way to send and receive datagrams over IP network.
VPN Virtual Private Network a network that is constructed by using public wires usually the Internet to
connect to a private network, such as a company's internal network.
VRRP Virtual Router Redundancy Protocol - an election protocol that dynamically assigns responsibility for one
or more virtual router(s) to the VRRP router(s) on a LAN, allowing several routers on a multiaccess link to utilize the
same virtual IP address.
GRE Tunnel Generic Routing Encapsulation - a tunneling protocol developed by Cisco Systems that can
encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol
internetwork.
PPPD Point to Point Protocol Daemon it is used to manage network connections between two nodes on Unix-
like operating systems. It is configured using command-line arguments and configuration files.
SSH Secure SHell - a program to log into another computer over a network, to execute commands in a remote
machine, and to move files from one machine to another. It provides strong authentication and secure communications
over insecure channels.
VRRPD Virtual Router Redundancy Protocol it is designed to eliminate the single point of failure associated
with statically routed networks by automatically providing failover using multiple LAN paths through alternate routers.
SNMP Simple Network Management Protocol - a set of protocols for managing complex networks. SNMP works
by sending messages, called protocol data units (PDUs), to different parts of a network.
96


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for Teltonika RUT950 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of Teltonika RUT950 in the language / languages: English as an attachment in your email.

The manual is 4,48 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info