User`s manual
433
DWS-1008 User’s Manual
D-Link Systems, Inc.
Appendix D - Glossary
scalability
The ability to adapt easily to increased or decreased requirements without impairing
performance.
secure hashing algorithm
See SHA.
Secure Shell protocol
See SSH.
Secure Sockets Layer protocol
See SSL.
security ACL
Security access control list. An ordered list of rules to control access to and from a network
by determining whether to forward or lter packets that are entering or exiting it. Associating
a security ACL with a particular user, port, virtual LAN (VLAN), or virtual port on a DWS-1008
switch controls the network trafc to or from the user, port, VLAN, or virtual port. The rules in
an ACL are known as access control entries (ACEs). See also ACE.
SentrySweep™
A radio frequency (RF) detection sweep that runs continuously on the disabled radios. See
also RF detection sweep.
session
A related set of communication transactions between an authenticated user (client) and the
specic station to which the client is bound.
Session Initialization Protocol
See SIP.
service set identier
See SSID.
SHA
Secure hashing algorithm. A one-way hashing algorithm used in many authentication
algorithms and also for key derivation in many algorithms. A SHA produces a 160-bit hash.
shared secret
A static key distributed by an out-of-band mechanism to both the sender and receiver. Also
known as a shared key or preshared key (PSK), a shared secret is used as input to a one-way
hash algorithm. When a shared secret is used for authentication, if the hash output of both
sender and receiver is the same, they share the same secret and are authenticated. A shared
secret can also be used for encryption key generation and key derivation.