Cisco Systems, Inc.
All contents are Copyright © 1992–2003 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 7 of 18
Granular rate limiting • Cisco Committed Information Rate (CIR) function guarantees bandwidth in
increments as low as 8 Kbps.
• Rate limiting is provided based on source and destination IP address, source and
destination MAC address, Layer 4 TCP/UDP information, or any combination of
these fields, using QoS ACLs (IP ACLs or MAC ACLs), class maps, and policy
maps.
• Asynchronous data flows upstream and downstream from the end station or on
the uplink are easily managed using ingress policing and egress shaping.
• Up to 64 aggregate or individual policers are available per Fast Ethernet or
Gigabit Ethernet port.
Security
Network-wide security
features
• IEEE 802.1x allows dynamic, port-based security, providing user authentication.
• IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a
specific user regardless of where the user is connected.
• IEEE 802.1x with voice VLAN permits an IP phone to access the voice VLAN
irrespective of the authorized or unauthorized state of the port.
• IEEE 802.1x and port security are provided to authenticate the port and manage
network access for all MAC addresses, including that of the client.
• IEEE 802.1x with an ACL assignment allows for specific identity-based security
policies regardless of where the user is connected.
• IEEE 802.1x with Guest VLAN allows guests without 802.1x clients to have limited
network access on the Guest VLAN.
• Cisco security VLAN ACLs (VACLs) on all VLANs prevent unauthorized data flows
to be bridged within VLANs.
• Cisco standard and extended IP security Router ACLs (RACLs) define security
policies on routed interfaces for control-plane and data-plane traffic.
• Port-based ACLs (PACLs) for Layer 2 interfaces allow security policies to be
applied on individual switch ports.
• Secure Shell (SSH) Protocol, Kerberos, and Simple Network Management
Protocol Version 3 (SNMPv3) provide network security by encrypting
administrator traffic during Telnet and SNMP sessions. SSH, Kerberos, and the
cryptographic version of SNMPv3 require a special cryptographic software image
due to U.S. export restrictions.
• Private VLAN Edge provides security and isolation between switch ports, which
helps ensure that users cannot snoop on other users’ traffic.
• Bidirectional data support on the Switched Port Analyzer (SPAN) port allows Cisco
Secure Intrusion Detection System (IDS) to take action when an intruder is
detected.
• Terminal Access Controller Access Control System Plus (TACACS+) and Remote
Authentication Dial-In User Service (RADIUS) authentication enable centralized
control of the switch and restrict unauthorized users from altering the
configuration.
• MAC address notification allows administrators to be notified of users added to
or removed from the network.
• Port security secures the access to an access or trunk port based on MAC address.
• After a specific timeframe, the aging feature removes the MAC address from the
switch to allow another device to connect to the same port.
Table 1 Product Features and Benefits
Feature Benefit