
Overview
19
Instruction Manual - NXA-ENET8-POE+
Description of Software Features
The switch provides a wide range of advanced performance enhancing features. Flow control eliminates the loss of packets due to
bottlenecks caused by port saturation. Storm suppression prevents broadcast, multicast, and unknown unicast traffic storms from
engulfing the network. Untagged (port-based), tagged, and protocol-based VLANs, plus support for automatic GVRP VLAN
registration provide traffic security and efficient use of network bandwidth. CoS priority queueing ensures the minimum delay for
moving real-time multimedia data across the network. While multicast filtering provides support for real-time network applications.
Some of the management features are briefly described below.
Configuration Backup and Restore
You can save the current configuration settings to a file on the management station (using the web interface) or an TFTP server
(using the web or console interface), and later download this file to restore the switch configuration settings.
Authentication
This switch authenticates management access via the console port, Telnet, or a web browser. User names and passwords can be
configured locally or can be verified via a remote authentication server (i.e., RADIUS or ). Port-based authentication is
also supported via the IEEE 802.1X protocol. This protocol uses Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then uses the EAP between the switch and the authentication server to verify the
client's right to access the network via an authentication server (i.e., RADIUS or server).
Other authentication options include HTTPS for secure management access via the web, SSH for secure management access over
a Telnet-equivalent connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web management access. MAC address
filtering and IP source guard also provide authenticated port access. While DHCP snooping is provided to prevent malicious attacks
from insecure ports.
Access Control Lists
ACLs provide packet filtering for IP frames (based on address, protocol, TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can be used to improve performance by blocking unnecessary network traffic or to
implement security controls by restricting access to specific network resources or protocols.
Port Configuration
You can manually configure the speed, duplex mode, and flow control used on specific ports, or use auto-negotiation to detect the
connection settings used by the attached device. Use full-duplex mode on ports whenever possible to double the throughput of
switch connections. Flow control should also be enabled to control network traffic during periods of congestion and prevent the
loss of packets when port buffer thresholds are exceeded. The switch supports flow control based on the IEEE 802.3x standard
(now incorporated in IEEE 802.3-2002).
Rate Limiting
This feature controls the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces
at the edge of a network to limit traffic into or out of the network. Packets that exceed the acceptable amount of traffic are
dropped.
Port Mirroring
The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach a protocol analyzer or RMON
probe to this port to perform traffic analysis and verify connection integrity.
Port Trunking
Ports can be combined into an aggregate connection. Trunks can be manually set up or dynamically configured using Link
Aggregation Control Protocol (LACP - IEEE 802.3-2005). The additional ports dramatically increase the throughput across any
connection, and provide redundancy by taking over the load if a port in the trunk should fail. The switch supports up to 8 trunks.
Storm Control
Broadcast, multicast and unknown unicast storm suppression prevents traffic from overwhelming the network.When enabled on a
port, the level of traffic passing through the port is restricted. If traffic rises above a pre-defined threshold, it will be throttled until
the level falls back beneath the threshold.
Static MAC Addresses
A static address can be assigned to a specific interface on this switch. Static addresses are bound to the assigned interface and will
not be moved. When a static address is seen on another interface, the address will be ignored and will not be written to the address
table. Static addresses can be used to provide network security by restricting access for a known host to a specific port.
IP Address Filtering
Access to insecure ports can be controlled using DHCP Snooping which filters ingress traffic based on static IP addresses and
addresses stored in the DHCP Snooping table. Traffic can also be restricted to specific source IP addresses or source IP/MAC
address pairs based on static entries or entries stored in the DHCP Snooping table.
IEEE 802.1D Bridge
The switch supports IEEE 802.1D transparent bridging. The address table facilitates data switching by learning addresses, and then
filtering or forwarding traffic based on this information. The address table supports up to 16K addresses.