
C
HAPTER
1
| Introduction
Description of Software Features
– 59 –
). Port-based authentication is also supported via the IEEE
802.1X protocol. This protocol uses Extensible Authentication Protocol over
LANs (EAPOL) to request user credentials from the 802.1X client, and then
uses the EAP between the switch and the authentication server to verify
the client’s right to access the network via an authentication server (i.e.,
RADIUS or server).
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for web/SNMP/Telnet/web
management access, and MAC address filtering for port access.
A
CCESS
C
ONTROL
L
ISTS
ACLs provide packet filtering for IP frames (based on address, protocol,
TCP/UDP port number or TCP control code) or any frames (based on MAC
address or Ethernet type). ACLs can by used to improve performance by
blocking unnecessary network traffic or to implement security controls by
restricting access to specific network resources or protocols.
DHCP
A DHCP server is provided to assign IP addresses to host devices. Since
DHCP uses a broadcast mechanism, a DHCP server and its client must
physically reside on the same subnet. Since it is not practical to have a
DHCP server on every subnet, DHCP Relay is also supported to allow
dynamic configuration of local clients from a DHCP server located in a
different network.
P
ORT
C
ONFIGURATION
You can manually configure the speed and duplex mode, and flow control
used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports
whenever possible to double the throughput of switch connections. Flow
control should also be enabled to control network traffic during periods of
congestion and prevent the loss of packets when port buffer thresholds are
exceeded. The switch supports flow control based on the IEEE 802.3x
standard (now incorporated in IEEE 802.3-2002).
P
ORT
M
IRRORING
The switch can unobtrusively mirror traffic from any port to a monitor port.
You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
P
ORT
T
RUNKING
Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control
Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically
increase the throughput across any connection, and provide redundancy by
taking over the load if a port in the trunk should fail. The switch supports
up to 32 trunks.
Содержание ECS4610-24F
Страница 1: ...Management Guide www edge core com ECS4610 24F 24 Port Layer 3 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 6: ...ABOUT THIS GUIDE 6...
Страница 36: ...CONTENTS 36...
Страница 48: ...FIGURES 48...
Страница 54: ...TABLES 54...
Страница 56: ...SECTION I Getting Started 56...
Страница 78: ...CHAPTER 2 Initial Switch Configuration Managing System Files 78...
Страница 80: ...SECTION II Web Configuration 80 Unicast Routing on page 483 Multicast Routing on page 541...
Страница 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Страница 123: ...CHAPTER 4 Basic Management Tasks Resetting the System 123 Figure 22 Restarting the Switch Regularly...
Страница 124: ...CHAPTER 4 Basic Management Tasks Resetting the System 124...
Страница 186: ...CHAPTER 6 VLAN Configuration Configuring MAC based VLANs 186...
Страница 194: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 194...
Страница 218: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 218...
Страница 220: ...CHAPTER 9 Rate Limit Configuration 220 Figure 103 Configuring Rate Limits...
Страница 222: ...CHAPTER 10 Storm Control Configuration 222 Figure 104 Configuring Broadcast Storm Control...
Страница 238: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 238...
Страница 334: ...CHAPTER 13 Security Measures DHCP Snooping 334...
Страница 429: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 429 Figure 257 Showing All MVR Groups Assigned to a Port...
Страница 430: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 430...
Страница 540: ...CHAPTER 20 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2 540...
Страница 564: ...CHAPTER 21 Multicast Routing Configuring PIM for IPv4 564 Figure 375 Showing RP Mapping...
Страница 578: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 578...
Страница 628: ...CHAPTER 24 System Management Commands Time Range 628...
Страница 648: ...CHAPTER 25 SNMP Commands 648...
Страница 656: ...CHAPTER 26 Remote Monitoring Commands 656...
Страница 786: ...CHAPTER 30 Interface Commands 786...
Страница 800: ...CHAPTER 32 Port Mirroring Commands Local Port Mirroring Commands 800...
Страница 902: ...CHAPTER 38 Quality of Service Commands 902...
Страница 950: ...CHAPTER 39 Multicast Filtering Commands IGMP Proxy Routing 950...
Страница 968: ...CHAPTER 40 LLDP Commands 968...
Страница 978: ...CHAPTER 41 Domain Name Service Commands 978...
Страница 1084: ...CHAPTER 45 IP Routing Commands Open Shortest Path First OSPFv2 1084...
Страница 1114: ...SECTION IV Appendices 1114...
Страница 1120: ...APPENDIX A Software Specifications Management Information Bases 1120...
Страница 1142: ...COMMAND LIST 1142...
Страница 1152: ...INDEX 1152...
Страница 1153: ......
Страница 1154: ...ECS4610 24F E052010 ST R01 149100000092A...