Features
29
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User
Guide\Dell_Astute_Features.fm
D E L L CO N F I D E N T I A L – P R E L I M I N A RY 8 / 9 / 16 - F O R P RO O F O N L Y
The switch provides the ability to demand strong passwords, meaning that
they must contain both upper and lower-case letters, numbers, and special
characters.
For more information, see
Access Control Lists (ACL)
Access Control Lists
(ACL) enable network managers to define classification
rules and actions for specific ingress ports. Packets entering an ingress port
with an active ACL are either admitted or denied entry according to the rules
they match (or not match). An administrator can also configure an ACL rule
to shutdown a port with matching packets.
For more information, see
Dynamic ACL/Dynamic Policy Assignment (DACL/DPA)
The network administrator can specify the user's ACL in the RADIUS server.
After successful authentication, the user is assigned that ACL.
For more information, see
DHCP Snooping
DHCP Snooping expands network security by providing firewall security
between untrusted interfaces and DHCP servers. By enabling DHCP
Snooping, network administrators can differentiate between trusted
interfaces connected to end-users or DHCP servers and untrusted interfaces
located beyond the network firewall.
For more information, see
.
DHCP Relay
The device can act as a DHCP Relay agent that listens for DHCP messages,
and relays them between DHCP servers and clients, which reside in different
VLANs or IP subnets.
For more information, see