
C
HAPTER
1
| Introduction
Description of Software Features
– 78 –
taking over the load if a port in the trunk should fail. The switch supports
up to 12 trunks.
S
TORM
C
ONTROL
Broadcast, multicast and unknown unicast storm suppression prevents
traffic from overwhelming the network.When enabled on a port, the level of
traffic passing through the port is restricted. If traffic rises above a pre-
defined threshold, it will be throttled until the level falls back beneath the
threshold.
S
TATIC
MAC
A
DDRESSES
A static address can be assigned to a specific interface on this switch.
Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will
be ignored and will not be written to the address table. Static addresses
can be used to provide network security by restricting access for a known
host to a specific port.
IP A
DDRESS
F
ILTERING
Access to insecure ports can be controlled using DHCP Snooping which
filters ingress traffic based on static IP addresses and addresses stored in
the DHCP Snooping table. Traffic can also be restricted to specific source IP
addresses or source IP/MAC address pairs based on static entries or entries
stored in the DHCP Snooping table.
IEEE 802.1D B
RIDGE
The switch supports IEEE 802.1D transparent bridging. The address table
facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up
to 16K addresses.
S
TORE
-
AND
-F
ORWARD
S
WITCHING
The switch copies each frame into its memory before forwarding them to
another port. This ensures that all frames are a standard Ethernet size and
have been verified for accuracy with the cyclic redundancy check (CRC).
This prevents bad frames from entering the network and wasting
bandwidth.
To avoid dropping frames on congested ports, the switch provides 8 Mbits
for frame buffering. This buffer can queue packets awaiting transmission
on congested networks.
S
PANNING
T
REE
A
LGORITHM
The switch supports these spanning tree protocols:
◆
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides
loop detection. When there are multiple physical paths between
segments, this protocol will choose a single path and disable all others
to ensure that only one route exists between any two stations on the
network. This prevents the creation of network loops. However, if the
chosen path should fail for any reason, an alternate path will be
activated to maintain the connection.
Содержание ECS4110-28T
Страница 1: ...Management Guide www edge core com ECS4110 28T 28P 52T 52P 28 52 Port Gigabit Ethernet Layer 2 Switch...
Страница 2: ......
Страница 4: ......
Страница 63: ...FIGURES 63 Figure 428 Configuring VLAN Translation 1177...
Страница 64: ...FIGURES 64...
Страница 72: ...TABLES 72...
Страница 74: ...SECTION I Getting Started 74...
Страница 102: ...SECTION II Web Configuration 102 General IP Routing on page 679...
Страница 154: ...CHAPTER 4 Basic Management Tasks Resetting the System 154...
Страница 198: ...CHAPTER 5 Interface Configuration VLAN Trunking 198 Figure 65 Configuring VLAN Trunking...
Страница 272: ...CHAPTER 9 Congestion Control Automatic Traffic Control 272...
Страница 286: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 286...
Страница 420: ...CHAPTER 13 Security Measures DHCP Snooping 420...
Страница 566: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 566...
Страница 638: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration for IPv6 638...
Страница 662: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 662...
Страница 678: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 678...
Страница 792: ...CHAPTER 21 System Management Commands Switch Clustering 792...
Страница 822: ...CHAPTER 23 Remote Monitoring Commands 822...
Страница 888: ...CHAPTER 24 Authentication Commands PPPoE Intermediate Agent 888...
Страница 968: ...CHAPTER 25 General Security Measures Port based Traffic Segmentation 968...
Страница 994: ...CHAPTER 26 Access Control Lists ACL Information 994...
Страница 1034: ...CHAPTER 28 Link Aggregation Commands Trunk Status Display Commands 1034...
Страница 1044: ...CHAPTER 29 Power over Ethernet Commands 1044...
Страница 1084: ...CHAPTER 33 UniDirectional Link Detection Commands 1084...
Страница 1090: ...CHAPTER 34 Address Table Commands 1090...
Страница 1194: ...CHAPTER 37 VLAN Commands Configuring Voice VLANs 1194...
Страница 1388: ...CHAPTER 42 CFM Commands Delay Measure Operations 1388...
Страница 1410: ...CHAPTER 44 Domain Name Service Commands 1410...
Страница 1420: ...CHAPTER 45 DHCP Commands DHCP Relay 1420...
Страница 1472: ...CHAPTER 46 IP Routing Commands IPv4 Commands 1472...
Страница 1474: ...SECTION IV Appendices 1474...
Страница 1502: ...COMMAND LIST 1502...
Страница 1513: ......
Страница 1514: ...ECS4110 28T ECS4110 28P ECS4110 52T ECS4110 52P E072014 ST R02 150200000929A...