User's Manual
Table Of Contents
- 1. INTRODUCTION
 - 2. INSTALLATION
 - 3. SWITCH MANAGEMENT
 - 4. WEB CONFIGURATION
- 4.1 Main Web Page
 - 4.2 System
 - 4.3 PoE Configuration
 - 4.4 Basic Configuration
 - 4.5 VLAN Configuration
 - 4.6 QoS Configuration
 - 4.7 ACL Configuration
 - 4.8 Security
 - 4.9 Advanced Features
 - 4.10 Monitoring
 
 - 5. COMMAND LINE INTERFACE
 - 6. Command Line Mode
 - 7. SWITCH OPERATION
 - 8. Power over Ethernet Overview
 - 9. TROUBLESHOOTING
 - APPENDEX A: Networking Connection
 - APPENDIX B: GLOSSARY
 
User’s Manual of FGSW-Series 
204 
AES 
AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to 
improve WLAN security. It is an encryption standard by the U.S. government, which will replace DES and 3DES. AES 
has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits. 
AMS 
AMS is an acronym for Auto Media Select. AMS is used for dual media ports (ports supporting both copper (cu) and 
fiber (SFP) cables. AMS automatically determines if a SFP or a CU cable is inserted and switches to the corresponding 
media. If both SFP and cu cables are inserted, the port will select the prefered media. 
APS 
APS is an acronym for Automatic Protection Switching. This protocol is used to secure that switching is done 
bidirectional in the two ends of a protection group, as defined in G.8031. 
Aggregation   
Using multiple ports in parallel to increase the link speed beyond the limits of a port and to increase the redundancy for 
higher availability.   
(Also Port Aggregation, Link Aggregation). 
ARP   
ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP address into a physical 
address, such as an Ethernet address. ARP allows a host to communicate with other hosts when only the Internet 
address of its neighbors is known. Before using IP, the host sends a broadcast ARP request containing the Internet 
address of the desired destination system.   
ARP Inspection 
ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to 
Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests 
and responses can go through the switch device. 
Auto-Negotiation   
Auto-negotiation is the process where two different devices establish the mode of operation and the speed settings 
that can be shared by those devices for a link.   










