eos.arista.com

Upvotes received1
Downvotes received1
Karma:1 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (44)

1

0 Thumbs up   0 Thumbs down

access list


The switch configuration used for the purpose of filtering Layer 2, Layer 3, or Layer 4 traffic.
Source: eos.arista.com

2

0 Thumbs up   0 Thumbs down

Application Performance Management


A monitoring and management tool that analyzes and reports on the performance and availability of software applications.
Source: eos.arista.com

3

0 Thumbs up   0 Thumbs down

bit masking


Due to compliance requirements, some bits residing in the datagram (for example a Social Security number) of a packet could require the need to mask or obfuscate that data.  This requires hardware capable of capturing the entire packet and searching for specified bit patterns in the datagram and then obfuscating those bit patterns.
Source: eos.arista.com

4

0 Thumbs up   0 Thumbs down

deep packet inspection


Traditional DPI in security devices inspects all bytes of a packet from Layer 2-7.  In Tap Aggregation switches, it allows the administrator to inspect and match (then take action on) additional bytes in the L2/L3/L4 header.
Source: eos.arista.com

5

0 Thumbs up   0 Thumbs down

denial of service


A type of network attack that attempts to make a machine or network resource unavailable to users through various vulnerabilities of the infrastructure.
Source: eos.arista.com

6

0 Thumbs up   0 Thumbs down

generic routing encapsulation


An overlay technology that uses a tunneling technique to perform any Layer 3 protocol-in-IP encapsulation that provides a means to create private point-to-point connections similar to a virtual private network (VPN)
Source: eos.arista.com

7

0 Thumbs up   0 Thumbs down

GPRS Tunneling Protocol


A group of IP-based protocols used to carry general packet radio service (GPRS) traffic within networks.  GTP traffic can consist of signalling traffic (GTP-C), user data traffic (GTP-U), and GTP prime (GTP’) data used for carrying the charging data.
Source: eos.arista.com

8

0 Thumbs up   0 Thumbs down

Intrusion detection system


An IDS is a passive security tool which performs data analysis on network traffic.
Source: eos.arista.com

9

0 Thumbs up   0 Thumbs down

Link Layer Discovery Protocol


A link layer protocol standard (IEEE 802.1AB) used by devices to advertise their identity and capabilities on a local area network at a fixed interval.  Each frame contains one LLDP Data Unit (LLDPDU) and each LLDPDU contains a set of type-length-value (TLV) structures designating information such as chassis ID, port ID, and other identifying infor [..]
Source: eos.arista.com

10

0 Thumbs up   0 Thumbs down

Load-balancing


This feature enables traffic from one or more Tap ports in an Aggregation Group to be evenly distributed out of one or more Tool ports either through a standard hash function or symmetrically where all packets from unique TCP sessions are sent through the same Tool port.
Source: eos.arista.com


To view all 44 definitions, please sign in.