D
ESCRIPTION
OF
S
OFTWARE
F
EATURES
1-3
Configuration Backup and Restore
– You can save the current
configuration settings to a file on a TFTP server, and later download this
file to restore the switch configuration settings.
Authentication
– This switch authenticates management access via the
console port, Telnet or web browser. User names and passwords can be
configured locally or can be verified via a remote authentication server (i.e.,
RADIUS or ). Port-based authentication is also supported via
the IEEE 802.1X protocol. This protocol uses the Extensible
Authentication Protocol over LANs (EAPOL) to request a user name and
password from the 802.1X client, and then verifies the client’s right to
access the network via an authentication server.
Other authentication options include HTTPS for secure management
access via the web, SSH for secure management access over a
Telnet-equivalent connection, SNMP Version 3, IP address filtering for
SNMP/web/Telnet management access, and MAC address filtering for
port access.
Access Control Lists
– ACLs provide packet filtering for IP frames
(based on address, protocol, TCP/UDP port number or TCP control
code) or any frames (based on MAC address or Ethernet type). ACLs can
by used to improve performance by blocking unnecessary network traffic
or to implement security controls by restricting access to specific network
resources or protocols.
Port Configuration
– You can manually configure the speed, duplex
mode, and flow control used on specific ports, or use auto-negotiation to
detect the connection settings used by the attached device. Use the
full-duplex mode on ports whenever possible to double the throughput of
switch connections. Flow control should also be enabled to control
network traffic during periods of congestion and prevent the loss of
packets when port buffer thresholds are exceeded. The switch supports
flow control based on the IEEE 802.3x standard.
Содержание 6128L2
Страница 2: ......
Страница 21: ...CONTENTS xvii Glossary Index ...
Страница 22: ...CONTENTS xviii ...
Страница 26: ...TABLES xxii ...
Страница 40: ...INTRODUCTION 1 10 ...
Страница 54: ...INITIAL CONFIGURATION 2 14 ...
Страница 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Страница 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Страница 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Страница 592: ...TROUBLESHOOTING B 4 ...
Страница 605: ......