Brocade Communications Systems Mobility 7131 Series Service Manual Page 226

  • Download
  • Add to my manuals
  • Print
  • Page
    / 520
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 225
214 Brocade Mobility 7131 Access Point Product Reference Guide
53-1002517-01
6
4. Click Apply to save any changes to the Subnet Access screen. Navigating away from the screen
without clicking the Apply button results in all changes to the screens being lost.
5. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the
settings displayed on the Subnet Access screen to the last saved configuration.
6. Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout
before the applet is closed.
Available Protocols
Protocols that are not pre-configured can be specified using the drop down list within the Transport
column within the Subnet Access and Advanced Subnet Access screens. They include:
ALL - Enables all of the protocol options displayed in the drop-down menu (as described
below).
TCP - Transmission Control Protocol is a set of rules for sending data as message units over the
Internet. TCP manages individual data packets. Messages are divided into packets for efficient
routing through the Internet.
UDP - User Datagram Protocol is used for broadcasting data over the Internet. Like TCP, UDP
runs on top of Internet Protocol (IP) networks. Unlike TCP/IP, UDP/IP provides few error
recovery services. UDP offers a way to directly connect, and then send and receive datagrams
over an IP network.
ICMP - Internet Control Message Protocol is tightly integrated with IP. ICMP messages are used
for out-of-band messages related to network operation. ICMP packet delivery is unreliable.
Hosts cannot count on receiving ICMP packets for a network problem.
AH - Authentication Header is one of the two key components of IP Security Protocol (IPsec).
The other key component is Encapsulating Security Protocol (ESP).
AH provides authentication, proving the packet sender really is the sender, and the data
really is the data sent. AH can be used in transport mode, providing security between two
end points. Also, AH can be used in tunnel mode, providing security like that of a Virtual
Private Network (VPN).
ESP - Encapsulating Security Protocol is one of two key components of IPsec. The other key
component is Authentication Header (AH). ESP encrypts the packets and provides
authentication services. ESP can be used in transport mode, providing security between two
end points. ESP can also be used in tunnel mode, providing security like that of a Virtual
Private Network (VPN).
Del (Delete) Click Del (Delete) to remove a selected list entry.
Name Specify a name for a newly configured protocol.
Transport Select a protocol from the drop-down menu. For a detailed description of the protocols
available, see Available Protocols on page 6-214.
Start Port Enter the starting port number for a range of ports. If the protocol uses a single port, enter
that port in this field.
End Port Enter the ending port number for a port range. If the protocol uses a single port, leave the
field blank. A new entry might use Web Traffic for its name, TCP for its protocol, and 80 for
its port number.
Page view 225
1 2 ... 221 222 223 224 225 226 227 228 229 230 231 ... 519 520

Comments to this Manuals

No comments