Description of Software Features
1-3
1
Description of Software Features
This switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Port-based, protocol-based and private VLANs, plus support
for automatic GVRP VLAN registration provide traffic security and efficient use of
network bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering provides
support for real-time network applications. Some of the management features are
briefly described below.
Configuration Backup and Restore
– You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication
– This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or ).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses the Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then verifies the client’s right to access
the network via an authentication server (i.e., RADIUS server).
This switch also supports authentication, authorization, and accounting. AAA
provides accounting and billing for IEEE 802.1X authenticated users that access the
network, and for users that access management interfaces through the console and
Telnet. Authorization is provided for users that access management interfaces on
the switch through the console and Telnet. The AAA features use RADIUS or
server groups for centralized and robust administration control.
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection, IP
address filtering for SNMP/web/Telnet management access, and MAC address
filtering for port access.
Access Control Lists
– ACLs provide packet filtering for IP frames (based on
address, protocol, or TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can be used to improve
performance by blocking unnecessary network traffic or to implement security
controls by restricting access to specific network resources or protocols.
Tunneling
Supports tunneling with IEEE 802.1Q tunneling (QinQ)
Switch Clustering
Supports up to 36 Member switches in a cluster
Table 1-2 Key Features
(Continued)
Feature
Description
Summary of Contents for iES4024GP
Page 1: ...iES4028F 4028FP 4024GP ...
Page 4: ...iv This page is intentionally left blank ...
Page 10: ...x This page is intentionally left blank ...
Page 28: ...Contents xxviii This page is intentionally left blank ...
Page 32: ...Tables xxxii This page is intentionally left blank ...
Page 46: ...Introduction 1 10 1 This page is intentionally left blank ...
Page 336: ...Configuring the Switch 3 280 3 This page is intentionally left blank ...
Page 688: ...Command Line Interface 4 352 4 This page is intentionally left blank ...
Page 702: ...Glossary Glossary 8 This page is intentionally left blank ...
Page 710: ...Index 8 Index This page is intentionally left blank ...
Page 711: ...This page is intentionally left blank ...
Page 712: ...iES4028F 4028FP 4024GP ...