Description of Software Features
1-3
1
Port Configuration
– You can manually configure the speed and duplex mode, and
flow control used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports whenever
possible to double the throughput of switch connections. Flow control should also be
enabled to control network traffic during periods of congestion and prevent the loss
of packets when port buffer thresholds are exceeded. The switch supports flow
control based on the IEEE 802.3x standard.
Rate Limiting
– This feature controls the maximum rate for traffic transmitted or
received on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within the rate limit is
transmitted, while packets that exceed the acceptable amount of traffic are dropped.
Port Mirroring
– The switch can unobtrusively mirror traffic from any port to a
monitor port. You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
Port Trunking
– Ports can be combined into an aggregate connection. Trunks can
be manually set up or dynamically configured using IEEE 802.3-2005 (formerly
IEEE 802.3ad) Link Aggregation Control Protocol (LACP). The additional ports
dramatically increase the throughput across any connection, and provide
redundancy by taking over the load if a port in the trunk should fail. The switch
supports up to 24 trunks.
Broadcast Storm Control
– Broadcast suppression prevents broadcast traffic from
overwhelming the network. When enabled on a port, the level of broadcast traffic
passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it will be throttled until the level falls back beneath the threshold.
Static Addresses
– A static address can be assigned to a specific interface on this
switch. Static addresses are bound to the assigned interface and will not be moved.
When a static address is seen on another interface, the address will be ignored and
will not be written to the address table. Static addresses can be used to provide
network security by restricting access for a known host to a specific port.
IEEE 802.1D Bridge
– The switch supports IEEE 802.1D transparent bridging. The
address table facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up to 8K
addresses.
Store-and-Forward Switching
– The switch copies each frame into its memory
before forwarding them to another port. This ensures that all frames are a standard
Ethernet size and have been verified for accuracy with the cyclic redundancy check
(CRC). This prevents bad frames from entering the network and wasting bandwidth.
To avoid dropping frames on congested ports, the switch provides 0.75 MB for frame
buffering. This buffer can queue packets awaiting transmission on congested
networks.
Содержание Direk Tronik 24/48-Port
Страница 2: ......
Страница 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Страница 22: ...xxii Tables...
Страница 26: ...xxvi Figures...
Страница 28: ...Getting Started...
Страница 50: ...Initial Configuration 2 14 2...
Страница 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Страница 68: ...Basic System Settings 4 8 4...
Страница 118: ...Simple Network Management Protocol 11 18 11...
Страница 142: ...Configuring 802 1X Port Authentication 14 8 14...
Страница 154: ...Access Control Lists 15 12 15...
Страница 232: ...Configuring Protocol Based VLANs 25 4 25...
Страница 252: ...Quality of Service 27 8 27...
Страница 282: ...Using the Command Line Interface 31 10 31...
Страница 290: ...General Commands 33 6 33...
Страница 300: ...System Management Commands 34 10 34...
Страница 308: ...File Management Commands 35 8 35...
Страница 326: ...Event Logging Commands 37 8 37...
Страница 336: ...Time Commands 39 6 39...
Страница 406: ...Access Control List Commands 44 18 44...
Страница 418: ...Interface Commands 45 12 45...
Страница 432: ...Broadcast Storm Control Commands 47 2 47...
Страница 436: ...Rate Limit Commands 49 2 49...
Страница 478: ...VLAN Commands 52 18 52...
Страница 508: ...Quality of Service Commands 56 10 56...
Страница 518: ...Multicast Filtering Commands 57 10 57...
Страница 532: ...IPv4 Interface Commands 59 6 59...
Страница 560: ...IPv6 Interface Commands 60 28 60...
Страница 566: ...Switch Cluster Commands 61 6 61...
Страница 568: ...Appendices...
Страница 572: ...Software Specifications A 4 A TACACS Authentication Client MIB TCP MIB RFC 2012 Trap RFC 1215 UDP MIB RFC 2013...
Страница 582: ...Glossary Glossary 8...
Страница 587: ......
Страница 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...