C
HAPTER
1
| Introduction
Description of Software Features
– 24 –
Table 1: Key Features (Continued)
Feature Description
Spanning Tree Algorithm Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
Multiple Spanning Trees (MSTP)
Virtual LANs
Up to 4K using IEEE 802.1Q, port-based, protocol-based, private
VLANs, and voice VLANs, and QinQ tunnel
Traffic Prioritization
Queue mode and CoS configured by Ethernet type, VLAN ID, TCP/
UDP port, DSCP, ToS bit, VLAN tag priority, or port
Qualify of Service
Supports Differentiated Services (DiffServ), and DSCP remarking
Link Layer Discovery
Protocol
Used to discover basic information about neighboring devices
Multicast Filtering
Supports IGMP snooping and query, MLD snooping, and Multicast
VLAN Registration
D
ESCRIPTION OF
S
OFTWARE
F
EATURES
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Storm suppression prevents broadcast,
multicast, and unknown unicast traffic storms from engulfing the network.
Untagged (port-based), tagged, and protocol-based VLANs provide traffic
security and efficient use of network bandwidth. CoS priority queueing
ensures the minimum delay for moving real-time multimedia data across
the network. While multicast filtering provides support for real-time
network applications.
Some of the management features are briefly described below.
C
ONFIGURATION
B
ACKUP AND
R
ESTORE
You can save the current configuration settings to a file on the
management station (using the web interface) or a TFTP server (using the
console interface through Telnet), and later download this file to restore
the switch configuration settings.
A
UTHENTICATION
This switch authenticates management access via a web browser. User
names and passwords can be configured locally or can be verified via a
remote authentication server (i.e., RADIUS or ). Port-based
authentication is also supported via the IEEE 802.1X protocol. This protocol
uses Extensible Authentication Protocol over LANs (EAPOL) to request user
credentials from the 802.1X client, and then uses the EAP between the
switch and the authentication server to verify the client’s right to access
the network via an authentication server (i.e., RADIUS or
server).
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web
management access, and MAC address filtering for port access.
Содержание EX26262
Страница 1: ...Layer 2 Gigabit PoE Ethernet Switch Management Guide...
Страница 2: ......
Страница 3: ...MANAGEMENT GUIDE...
Страница 4: ......
Страница 6: ...6 ABOUT THIS GUIDE...
Страница 18: ...18 FIGURES...
Страница 20: ...20 TABLES...
Страница 22: ...22 SECTION I Getting Started...
Страница 34: ...34 SECTION II Web Configuration...
Страница 46: ...46 CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface...
Страница 202: ...CHAPTER 4 Configuring the Switch Quality of Service 202 Figure 83 Configuring Port Tag Remarking Mode...
Страница 290: ...290 CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling...
Страница 294: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 294...
Страница 300: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 300...
Страница 302: ...302 SECTION III Appendices...
Страница 320: ...GLOSSARY 320...
Страница 325: ......
Страница 326: ......