
C
HAPTER
1
| Introduction
Description of Software Features
– 71 –
802.1X protocol. This protocol uses Extensible Authentication Protocol over
LANs (EAPOL) to request user credentials from the 802.1X client, and then
uses the EAP between the switch and the authentication server to verify
the client’s right to access the network via an authentication server (i.e.,
RADIUS or server).
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web
management access. MAC address filtering and IP source guard also
provide authenticated port access. While DHCP snooping is provided to
prevent malicious attacks from insecure ports. While PPPoE Intermediate
Agent supports authentication of a client for a service provider.
A
CCESS
C
ONTROL
L
ISTS
ACLs provide packet filtering for IP frames (based on address, protocol,
TCP/UDP port number or TCP control code) or any frames (based on MAC
address or Ethernet type). ACLs can by used to improve performance by
blocking unnecessary network traffic or to implement security controls by
restricting access to specific network resources or protocols.
P
ORT
C
ONFIGURATION
You can manually configure the speed, duplex mode, and flow control used
on specific ports, or use auto-negotiation to detect the connection settings
used by the attached device. Use full-duplex mode on ports whenever
possible to double the throughput of switch connections. Flow control
should also be enabled to control network traffic during periods of
congestion and prevent the loss of packets when port buffer thresholds are
exceeded. The switch supports flow control based on the IEEE 802.3x
standard (now incorporated in IEEE 802.3-2002).
R
ATE
L
IMITING
This feature controls the maximum rate for traffic transmitted or received
on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Packets that exceed the
acceptable amount of traffic are dropped.
P
ORT
M
IRRORING
The switch can unobtrusively mirror traffic from any port to a monitor port.
You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
P
ORT
T
RUNKING
Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control
Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically
increase the throughput across any connection, and provide redundancy by
taking over the load if a port in the trunk should fail. The switch supports
up to 12 trunks.
Содержание ES3528MV2
Страница 1: ...Management Guide www edge core com ES3528MV2 ES3528MV2 DC 28 Port Fast Ethernet Layer 2 Switch...
Страница 2: ......
Страница 4: ......
Страница 48: ...CONTENTS 48...
Страница 68: ...SECTION I Getting Started 68...
Страница 78: ...CHAPTER 1 Introduction System Defaults 78...
Страница 96: ...SECTION II Web Configuration 96...
Страница 116: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 116...
Страница 148: ...CHAPTER 4 Basic Management Tasks Resetting the System 148...
Страница 192: ...CHAPTER 5 Interface Configuration VLAN Trunking 192 Figure 65 Configuring VLAN Trunking...
Страница 226: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 226...
Страница 236: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 236...
Страница 270: ...CHAPTER 9 Congestion Control Automatic Traffic Control 270...
Страница 300: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 300...
Страница 418: ...CHAPTER 13 Security Measures DHCP Snooping 418...
Страница 588: ...CHAPTER 15 IP Configuration Setting the Switch s IP Address IP Version 6 588...
Страница 606: ...CHAPTER 16 IP Services Configuring the PPPoE Intermediate Agent 606...
Страница 676: ...CHAPTER 17 Multicast Filtering Multicast VLAN Registration for IPv6 676...
Страница 772: ...CHAPTER 20 System Management Commands Switch Clustering 772...
Страница 802: ...CHAPTER 22 Remote Monitoring Commands 802...
Страница 808: ...CHAPTER 23 Flow Sampling Commands 808...
Страница 872: ...CHAPTER 24 Authentication Commands PPPoE Intermediate Agent 872...
Страница 950: ...CHAPTER 25 General Security Measures Port based Traffic Segmentation 950...
Страница 1002: ...CHAPTER 27 Interface Commands Power Savings 1002...
Страница 1016: ...CHAPTER 28 Link Aggregation Commands Trunk Status Display Commands 1016...
Страница 1046: ...CHAPTER 30 Congestion Control Commands Automatic Traffic Control Commands 1046...
Страница 1058: ...CHAPTER 32 UniDirectional Link Detection Commands 1058...
Страница 1064: ...CHAPTER 33 Address Table Commands 1064...
Страница 1124: ...CHAPTER 35 ERPS Commands 1124...
Страница 1168: ...CHAPTER 36 VLAN Commands Configuring Voice VLANs 1168...
Страница 1182: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 1182...
Страница 1202: ...CHAPTER 38 Quality of Service Commands 1202...
Страница 1360: ...CHAPTER 41 CFM Commands Delay Measure Operations 1360...
Страница 1382: ...CHAPTER 43 Domain Name Service Commands 1382...
Страница 1440: ...SECTION IV Appendices 1440...
Страница 1468: ...COMMAND LIST 1468...
Страница 1479: ......
Страница 1480: ...ES3528MV2 ES3528MV2 DC E112013 ST R03...