
12
Feature
Description
Multicast Filtering
Supports IGMP snooping and query, MLD snooping, and
MulticastVLAN Registration
1.2. Description of Software Features
CONFIGURATION BACKUP AND RESTORE
You can save the current configuration settings to a file on the management station (using
the web interface) or a TFTP server (using the console interface through Telnet), and later
download this file to restore the switch configuration settings.
AUTHENTICATION
This switch authenticates management access via a web browser. User names and
passwords can be configured locally or can be verified via a remote authentication server
(i.e., RADIUS or ). Port-based authentication is also supported via the IEEE
802.1X protocol. This protocol uses Extensible Authentication Protocol over LANs (EAPOL)
to request user credentials from the 802.1X client, and then uses the EAP between the
switch and the authentication server to verify the client’s right to access the network via an
authentication server (i.e., RADIUS or server).
Other authentication options include HTTPS for secure management access via the web,
SSH for secure management access over a Telnet-equivalent connection, SNMP Version 3,
IP address filtering for SNMP/Telnet/web management access, and MAC address filtering
for port access.
ACCESS CONTROL LISTS
ACLs provide packet filtering for IP frames (based on protocol, TCP/UDP port number or
frame type) or layer 2 frames (based on any destination MAC address for unicast, broadcast
or multicast, or based on VLAN ID or VLAN tag priority). ACLs can by used to improve
performance by blocking unnecessary network traffic or to implement security controls by
restricting access to specific network resources or protocols. Policies can be used to
differentiate service for client ports, server ports, network ports or guest ports. They can
also be used to strictly control network traffic by only allowing incoming frames that match
the source MAC and source IP on specific port.
PORT CONFIGURATION
You can manually configure the speed and duplex mode, and flow control used on specific
ports, or use auto-negotiation to detect the connection settings used by the attached device.
Содержание GEP-1070
Страница 80: ...80 authentication from any point within the network...
Страница 168: ...168...