User manual

70
VLAN
A Virtual Local Area network allows a network manager to logically segment a LAN into differ-
ent broadcast domains. Since this is a logical segmentation and not a physical one, worksta-
tions do not have to be physically located together.
VoIP
Voice over IP is a technology used for the delivery of voice communications and multimedia
sessions over IP networks rather than a PSTN line.
VPN
A Virtual Private Network creates a secure “tunnel” between the points within the VPN. Only
devices with the correct “key” will be able to work within the VPN. The VPN network can be
within a company LAN (Local Area Network), but different sites can also be connected over the
Internet in a secure way. One common use for VPN is for connecting a remote computer to the
corporate network, via e.g. a direct phone line or the Internet.
VPN Tunnel
VPN Tunneling is a link which connects a network directly to another network. The connection
between the complementary links is called a VPN tunnel VPN comprises with a VPN server
andaVPNclient.AVPNclientisusuallyasoftwareprogramwhichcanbeconguredtothe
VPN server.
WAN
A Wide Area Network is a network that covers a broad area over long distances using private
or public network transports between different LANs, MANs and other localised computer
networking architectures.
WDS Mode
Wireless Distribution System Mode is a MAC address-based system enabling the wireless in-
terconnectionofAccessPointsinanIEEE802.11network.
WEP
Wired Equivalent Privacy is a is a security protocol for wireless networks that encrypts trans-
mitted data.
WLAN
A Wireless LAN is a LAN that links two or more devices using some wireless distribution meth-
od. This gives users the ability to move around within a local coverage area and still be con-
nected to the network.
WOL
Wake on LAN allows a computer to be turned on or awakened by a network message.
WPA /WPA2
Wi-Fi Protected Access and Wi-Fi Protected Access II are security protocols and security cer-
ticationprogramsusedtosecurewirelesscomputernetworks.Theyarereccomendedover
WEP.