I
NTRODUCTION
1-3
Description of Software Features
The switch provides a wide range of advanced performance enhancing
features. Broadcast storm suppression prevents broadcast traffic storms
from engulfing the network. Untagged (port-based), tagged, and
protocol-based VLANs, plus support for automatic GVRP VLAN
registration provide traffic security and efficient use of network
bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering and
routing provides support for real-time network applications. Some of the
management features are briefly described below.
Configuration Backup and Restore – You can save the current
configuration settings to a file on a TFTP server, and later download this
file to restore the switch configuration settings.
Authentication – This switch authenticates management access via the
console port, Telnet or web browser. User names and passwords can be
configured locally or can be verified via a remote authentication server (i.e.,
RADIUS or TACACS+). Port-based authentication is also supported via
the IEEE 802.1X protocol. This protocol uses Extensible Authentication
Protocol over LANs (EAPOL) to request user credentials from the 802.1X
client, and then uses the EAP between the switch and the authentication
server to verify the client’s right to access the network via an authentication
server (i.e., RADIUS server).
Other authentication options include HTTPS for secure management
access via the web, SSH for secure management access over a
Telnet-equivalent connection, SNMP Version 3, IP address filtering for
SNMP/web/Telnet management access, and MAC address filtering for
port access.
Access Control Lists – ACLs provide packet filtering for IP frames
(based on address, protocol, TCP/UDP port number or TCP control
code) or any frames (based on MAC address or Ethernet type). ACLs can
by used to improve performance by blocking unnecessary network traffic