Cyclades User's Guide User Manual

Page 484

Advertising
background image

468

AlterPath KVM/net Installation, Administration, and User’s Guide

Stop Bit

A bit which signals the end of a unit of transmission on a serial
line.A stop bit may be transmitted after the end of each byte or
character.

Subnet Mask

A bit mask used to select bits from an Internet address for subnet
addressing. Also known as Address Mask.

Sudo

Sudo (superuser do) is a utility for Unix and Linux based systems
that provides an efficient way to give specific users permission to
use specific system commands at the root level of the system.
Sudo also logs all commands and arguments. Using sudo, a
system administrator can give some users or groups of users the
ability to run some or all commands at the root level of system
operation. It can control which commands a user can use on each
host and see clearly from a log which users used which
commands. Using timestamp files a system administrator can
control the amount of time a user has to enter commands after
they have entered their password and been granted appropriate
privileges.

TACACS

Terminal Access Controller Access Control System.

Authentication protocol, developed by the DDN community, that
provides remote access authentication and related services, such
as event logging. User passwords are administered in a central
database rather than in individual routers, providing an easily
scalable network security solution.

TACACS+

Terminal Access Controller Access Control System Plus. A
protocol that provides remote access authentication,
authorization, and related accounting and logging services, used
by Cisco Systems.

TCP Keep-Alive Interval The time interval between the periodic polling of all inactive

TCP/IP connections, checking that the client processes really are
still there. After a certain period of inactivity on an established
connection, the server's TCP/IP software will begin to send test
packets to the client, which must be acknowledged. After a preset

Advertising