Community Strings (for SNMP version 1 and 2c clients) 2-6
Trap Receivers 2-7
Configuring Access for SNMP Version 3 Clients 2-8
Managing System Files 2-8
Saving Configuration Settings 2-9
Section II: Switch Management
Chapter 3: Configuring the Switch 3-1
Using the Web Interface 3-1
Navigating the Web Browser Interface 3-2
Home Page 3-2
Configuration Options 3-3
Panel Display 3-3
Main Menu 3-4
Chapter 4: Basic Management Tasks 4-1
Displaying System Information 4-1
Configuring the Switch for Normal Operation or Tunneling Mode 4-3
Configuring the Maximum Frame Size 4-4
Configuring Support for Jumbo Frames 4-5
Displaying Switch Hardware/Software Versions 4-6
Displaying Bridge Extension Capabilities 4-7
Setting the Switch’s IP Address 4-8
v
Contents
Manual Configuration 4-9
Using DHCP/BOOTP 4-10
Managing Firmware 4-11
Downloading System Software from a Server 4-12
Saving or Restoring Configuration Settings 4-14
Downloading Configuration Settings from a Server 4-15
Console Port Settings 4-16
Telnet Settings 4-18
Configuring Event Logging 4-20
System Log Configuration 4-20
Remote Log Configuration 4-21
Displaying Log Messages 4-23
Sending Simple Mail Transfer Protocol Alerts 4-23
Resetting the System 4-25
Setting the System Clock 4-26
Configuring SNTP 4-26
Setting the Time Zone 4-27
Chapter 5: Simple Network Management Protocol 5-1
Enabling the SNMP Agent 5-2
Setting Community Access Strings 5-3
Specifying Trap Managers and Trap Types 5-4
Configuring SNMPv3 Management Access 5-7
Replacing the Default Secure-site Certificate 6-6
Configuring the Secure Shell 6-7
Generating the Host Key Pair 6-9
Configuring the SSH Server 6-11
Configuring 802.1X Port Authentication 6-13
Displaying 802.1X Global Settings 6-14
Configuring 802.1X Global Settings 6-15
Configuring Port Settings for 802.1X 6-15
Displaying 802.1X Statistics 6-18
Filtering IP Addresses for Management Access 6-20
vi
Contents
Chapter 7: Client Security 7-1
Configuring Port Security 7-1
Chapter 8: Access Control Lists 8-1
Configuring Access Control Lists 8-1
Setting the ACL Name and Type 8-2
Configuring a Standard ACL 8-3
Configuring an Extended ACL 8-4
Configuring a MAC ACL 8-7
Configuring ACL Masks 8-9
Specifying the Mask Type 8-9
Configuring an IP ACL Mask 8-10
Configuring a MAC ACL Mask 8-12
Binding a Port to an Access Control List 8-13
Chapter 9: Port Configuration 9-1
Displaying Connection Status 9-1
Configuring Interface Connections 9-3
Creating Trunk Groups 9-6
Statically Configuring a Trunk 9-7
Enabling LACP on Selected Ports 9-8
Configuring LACP Parameters 9-10
Displaying LACP Port Counters 9-13
Displaying LACP Settings and Status for the Local Side 9-14
Displaying LACP Settings and Status for the Remote Side 9-16
Setting Broadcast Storm Thresholds 9-17
Configuring Port Mirroring 9-19
Configuring Rate Limits 9-20
Showing Port Statistics 9-21
Chapter 10: Address Table Settings 10-1
Setting Static Addresses 10-1
Displaying the Address Table 10-2
Changing the Aging Time 10-4
Chapter 11: Spanning Tree Algorithm 11-1
Displaying Global Settings 11-3
Configuring Global Settings 11-6
Displaying Interface Settings 11-10
Configuring Interface Settings 11-13
Configuring Multiple Spanning Trees 11-16
Displaying Interface Settings for MSTP 11-19
Configuring Interface Settings for MSTP 11-20
Chapter 12: VLAN Configuration 12-1
IEEE 802.1Q VLANs 12-1
Enabling or Disabling GVRP (Global Setting) 12-4
vii
Contents
Displaying Basic VLAN Information 12-4
Displaying Current VLANs 12-5
Creating VLANs 12-6
Adding Static Members to VLANs (VLAN Index) 12-7
Adding Static Members to VLANs (Port Index) 12-9
Configuring VLAN Behavior for Interfaces 12-10
Configuring IEEE 802.1Q Tunneling 12-12
Adding an Interface to a QinQ Tunnel 12-16
Configuring Private VLANs 12-17
Enabling Private VLANs 12-17
Configuring Uplink and Downlink Ports 12-18
Configuring Protocol-Based VLANs 12-18
Configuring Protocol Groups 12-19
Mapping Protocols to VLANs 12-20
Chapter 13: Class of Service 13-1
Layer 2 Queue Settings 13-1
Setting the Default Priority for Interfaces 13-1
Mapping CoS Values to Egress Queues 13-3
Selecting the Queue Mode 13-5
Setting the Service Weight for Traffic Classes 13-6
Layer 3/4 Priority Settings 13-7
Mapping Layer 3/4 Priorities to CoS Values 13-7
Selecting IP Precedence/DSCP Priority 13-7
Mapping IP Precedence 13-8
Mapping DSCP Priority 13-10
Mapping IP Port Priority 13-11
Chapter 14: Quality of Service 14-1
Configuring Quality of Service Parameters 14-1
Configuring a Class Map 14-2
Creating QoS Policies 14-5
Attaching a Policy Map to Ingress Queues 14-8
Chapter 15: Multicast Filtering 15-1
Layer 2 IGMP (Snooping and Query) 15-2
Configuring IGMP Snooping and Query Parameters 15-3
Displaying Interfaces Attached to a Multicast Router 15-5
Specifying Static Interfaces for a Multicast Router 15-6
Displaying Port Members of Multicast Services 15-7
Assigning Ports to Multicast Services 15-8
Multicast VLAN Registration 15-9
Configuring Global MVR Settings 15-10
Displaying MVR Interface Status 15-11
Configuring MVR Interface Status 15-12
Displaying Port Members of Multicast Groups 15-14
viii
Contents
Assigning Static Multicast Groups to Interfaces 15-15
Chapter 16: Domain Name Service 16-1
Configuring General DNS Service Parameters 16-1
Configuring Static DNS Host to Address Entries 16-3
Displaying the DNS Cache 16-5
Section III: Command Line Interface
Chapter 17: Overview of Command Line Interface 17-1
Using the Command Line Interface 17-1
Accessing the CLI 17-1
Console Connection 17-1
Telnet Connection 17-1
Entering Commands 17-3
Keywords and Arguments 17-3
Minimum Abbreviation 17-3
Command Completion 17-3
Getting Help on Commands 17-3
Showing Commands 17-4
Partial Keyword Lookup 17-5
Negating the Effect of Commands 17-5
Using Command History 17-5
Understanding Command Modes 17-6
Exec Commands 17-6
Configuration Commands 17-7
Command Line Processing 17-9
Command Groups 17-10
Chapter 18: General Commands 18-1
enable 18-1
disable 18-2
configure 18-2
show history 18-3
reload 18-4
prompt 18-4
end 18-4
exit 18-5
quit 18-5
Chapter 19: System Management Commands 19-1
Device Designation Commands 19-1
hostname 19-1
System Status Commands 19-2
show startup-config 19-2
show running-config 19-4
ix
Contents
show system 19-6
show users 19-7
show version 19-7
System Mode Commands 19-8
system mode 19-8
show system mode 19-9
System MTU Commands 19-9
jumbo frame 19-10
system mtu 19-11
show system mtu 19-11
File Management Commands 19-12
copy 19-13
delete 19-15
dir 19-16
whichboot 19-17
boot system 19-17
Line Commands 19-19
line 19-19
login 19-20
password 19-21
timeout login response 19-22
exec-timeout 19-22
password-thresh 19-23
silent-time 19-24
databits 19-24
parity 19-25
speed 19-25
stopbits 19-26
disconnect 19-26
show line 19-27
Event Logging Commands 19-28
logging on 19-28
logging history 19-29
logging host 19-30
logging facility 19-30
logging trap 19-31
clear log 19-31
show logging 19-32
show log 19-33
sntp client 19-38
sntp server 19-39
sntp poll 19-39
show sntp 19-40
clock timezone 19-40
calendar set 19-41
show calendar 19-42
Chapter 20: SNMP Commands 20-1
snmp-server 20-2
show snmp 20-2
snmp-server community 20-3
snmp-server contact 20-4
snmp-server location 20-4
snmp-server host 20-5
snmp-server enable traps 20-7
snmp-server engine-id 20-8
show snmp engine-id 20-9
snmp-server view 20-10
show snmp view 20-11
snmp-server group 20-11
show snmp group 20-12
snmp-server user 20-14
show snmp user 20-15
radius-server host 21-6
radius-server port 21-7
radius-server key 21-7
radius-server retransmit 21-8
radius-server timeout 21-8
show radius-server 21-8
TACACS+ Client 21-9
tacacs-server host 21-9
tacacs-server port 21-10
tacacs-server key 21-10
show tacacs-server 21-11
xi
Contents
Web Server Commands 21-11
ip http port 21-11
ip http server 21-12
ip http secure-server 21-12
ip http secure-port 21-13
Telnet Server Commands 21-14
ip telnet server 21-14
Secure Shell Commands 21-15
ip ssh server 21-17
ip ssh timeout 21-18
ip ssh authentication-retries 21-19
ip ssh server-key size 21-19
delete public-key 21-20
ip ssh crypto host-key generate 21-20
ip ssh crypto zeroize 21-21
ip ssh save host-key 21-21
show ip ssh 21-22
show ssh 21-22
show public-key 21-23
ip source-guard 22-3
ip source-guard binding 22-5
show ip source-guard 22-6
show ip source-guard binding 22-6
DHCP Snooping Commands 22-7
ip dhcp snooping 22-7
xii
Contents
ip dhcp snooping vlan 22-9
ip dhcp snooping binding 22-10
ip dhcp snooping verify mac-address 22-11
ip dhcp snooping database flash 22-12
ip dhcp snooping trust 22-12
show ip dhcp snooping 22-13
show ip dhcp snooping binding 22-13
Chapter 23: Access Control List Commands 23-1
IP ACLs 23-1
access-list ip 23-2
permit, deny (Standard ACL) 23-2
permit, deny (Extended ACL) 23-3
show ip access-list 23-5
access-list ip mask-precedence 23-6
mask (IP ACL) 23-6
show access-list ip mask-precedence 23-10
ip access-group 23-11
show ip access-group 23-11
MAC ACLs 23-12
access-list mac 23-12
permit, deny (MAC ACL) 23-13
show mac access-list 23-14
access-list mac mask-precedence 23-15
mask (MAC ACL) 23-15
show access-list mac mask-precedence 23-17
mac access-group 23-18
show mac access-group 23-18
queue bandwidth 31-4
queue cos-map 31-4
show queue bandwidth 31-5
show queue cos-map 31-6
vlan priority 31-6
show vlan based priority 31-7
Priority Commands (Layer 3 and 4) 31-8
map ip port (Global Configuration) 31-8
map ip port (Interface Configuration) 31-9
map ip precedence (Global Configuration) 31-9
map ip precedence (Interface Configuration) 31-10
map ip dscp (Global Configuration) 31-11
map ip dscp (Interface Configuration) 31-11
show map ip port 31-12
show map ip precedence 31-13
show map ip dscp 31-14
Chapter 32: Quality of Service Commands 32-1
class-map 32-2
match 32-3
policy-map 32-4
class 32-5
set 32-6
police 32-6
service-policy 32-7
show class-map 32-8
show policy-map 32-8
show policy-map interface 32-9
Chapter 33: Multicast Filtering Commands 33-1
IGMP Snooping Commands 33-1
ip igmp snooping 33-2
ip igmp snooping vlan static 33-2
ip igmp snooping version 33-3
ip igmp snooping leave-proxy 33-3
ip igmp snooping immediate-leave 33-4
show ip igmp snooping 33-5
show mac-address-table multicast 33-6
IGMP Query Commands 33-6
ip igmp snooping querier 33-7
ip igmp snooping query-count 33-7
ip igmp snooping query-interval 33-8
ip igmp snooping query-max-response-time 33-8
ip igmp snooping router-port-expire-time 33-9
ip host 34-1
clear host 34-2
ip domain-name 34-3
ip domain-list 34-3
ip name-server 34-4
ip domain-lookup 34-5
show hosts 34-6
show dns 34-7
show dns cache 34-7
clear dns cache 34-8
Chapter 35: IP Interface Commands 35-1
Basic IP Configuration 35-1
ip address 35-1
ip default-gateway 35-2
ip dhcp restart 35-3
show ip interface 35-4
show ip redirects 35-4
show arp 35-4
ping 35-5
Section IV: Appendices
Appendix A: Software Specifications A-1
Software Features A-1
Management Features A-2
Standards A-2
Management Information Bases A-3
Appendix B: Troubleshooting B-1
Problems Accessing the Management Interface B-1
Using System Logs B-2
Table 20-4show snmp group - display description 20-13
Table 20-5show snmp user - display description 20-15
Table 21-1Authentication Commands 21-1
Table 21-2User Access Commands 21-1
Table 21-3Default Login Settings 21-2
Table 21-4Authentication Sequence Commands 21-4
Table 21-5RADIUS Client Commands 21-6
Table 21-6TACACS+ Client Commands 21-9
Table 21-7Web Server Commands 21-11
Table 21-8HTTPS System Support 21-13
Table 21-9Telnet Server Commands 21-14
Table 21-10Secure Shell Commands 21-15
Table 21-11show ssh - display description 21-22
Table 21-12802.1X Port Authentication Commands 21-24
Table 21-13Management IP Filter Commands 21-33
Table 22-1Client Security Commands 22-1
Table 22-2Port Security Commands 22-1
Table 22-3IP Source Guard Commands 22-3
Table 22-4DHCP Snooping Commands 22-7
Table 23-1Access Control List Commands 23-1
Table 23-2IP ACL Commands 23-1
Table 23-3MAC ACL Commands 23-12
Table 23-4ACL Information Commands 23-19
Table 24-1Interface Commands 24-1
Table 24-2show interfaces switchport - display description 24-12
Table 25-1Link Aggregation Commands 25-1
Table 25-2show lacp counters - display description 25-7
Table 25-3show lacp internal - display description 25-8
Table 25-4show lacp neighbors - display description 25-9
Table 25-5show lacp sysid - display description 25-10
Table 26-1Mirror Port Commands 26-1
Table 27-1Rate Limit Commands 27-1
Table 27-2Mapping Default to Per Port CoS Priority Levels 27-2
Table 28-1Address Table Commands 28-1
Table 29-1Spanning Tree Commands 29-1
Table 29-2Recommended STA Path Cost Range 29-12
Table 29-3Recommended STA Path Cost 29-12
Table 29-4Default STA Path Costs 29-12
Table 30-1VLAN Commands 30-1
Table 30-2GVRP and Bridge Extension Commands 30-1
Table 30-3Commands for Editing VLAN Groups 30-6
Table 30-4Commands for Configuring VLAN Interfaces 30-8
Table 30-5Commands for Displaying VLAN Information 30-13
Table 30-6Private VLAN Commands 30-14
Table 30-7Protocol-based VLAN Commands 30-16
xx
Tables
Table 30-8IEEE 802.1Q Tunneling Commands 30-20
Table 31-1Priority Commands 31-1
Table 31-2Priority Commands (Layer 2) 31-1
Table 31-3Default CoS Priority Levels 31-5
Table 31-4Priority Commands (Layer 3 and 4) 31-8
Table 31-5Mapping IP Precedence to CoS Values 31-10
Table 31-6Mapping IP DSCP to CoS Values 31-12
Table 32-1Quality of Service Commands 32-1
Table 33-1Multicast Filtering Commands 33-1
Table 33-2IGMP Snooping Commands 33-1
Table 33-3IGMP Query Commands 33-6
Table 33-4Static Multicast Routing Commands 33-10
Table 33-5Multicast VLAN Registration Commands 33-11
Table 33-6show mvr - display description 33-15
Table 33-7show mvr interface - display description 33-15
Table 33-8show mvr members - display description 33-16
Table 34-1DNS Commands 34-1
Table 34-2show dns cache - display description 34-7
Table 35-1Basic IP Configuration Commands 35-1
Table B-1Troubleshooting Chart B-1
xxi
Tables
xxii
Figures
Figure 3-1Home Page 3-2
Figure 3-2Front Panel Indicators 3-3
Figure 4-1System Information 4-2
Figure 4-2System Mode 4-3
Figure 4-3System MTU 4-4
Figure 4-4Configuring Support for Jumbo Frames 4-5
Figure 4-5Switch Information 4-6
Figure 4-6Displaying Bridge Extension Configuration 4-8
Figure 4-7IP Interface Configuration - Manual 4-9
Figure 4-8IP Interface Configuration - DHCP 4-10
Figure 4-9Copy Firmware 4-12
Figure 4-10Setting the Startup Code 4-12
Figure 4-11Deleting Files 4-13
Figure 4-12Downloading Configuration Settings for Start-Up 4-15
Figure 4-13Setting the Startup Configuration Settings 4-15
Figure 4-14Configuring the Console Port 4-17
Figure 4-15Configuring the Telnet Interface 4-19
Figure 4-16System Logs 4-21
Figure 4-17Remote Logs 4-22
Figure 4-18Displaying Logs 4-23
Figure 4-19Enabling and Configuring SMTP Alerts 4-24
Figure 4-20Resetting the System 4-25
Figure 4-21SNTP Configuration 4-26
Figure 4-22Clock Time Zone 4-27
Figure 5-1Enabling the SNMP Agent 5-2
Figure 5-2Configuring SNMP Community Strings 5-3
Figure 5-3Configuring SNMP Trap Managers 5-6
Figure 5-4Setting the SNMPv3 Engine ID 5-7
Figure 5-5Setting an Engine ID 5-8
Figure 5-6Configuring SNMPv3 Users 5-10
Figure 5-7Configuring Remote SNMPv3 Users 5-12
Figure 5-8Configuring SNMPv3 Groups 5-15
Figure 5-9Configuring SNMPv3 Views 5-17
Figure 6-1User Accounts 6-2
Figure 6-2Authentication Server Settings 6-4
Figure 6-3HTTPS Settings 6-6
Figure 6-4SSH Host-Key Settings 6-10
Figure 6-5SSH Server Settings 6-12
Figure 6-6802.1X Global Information 6-14
Figure 6-7802.1X Global Configuration 6-15
Figure 6-8802.1X Port Configuration 6-16
Figure 6-9802.1X Port Statistics 6-19
Figure 6-10IP Filter 6-21
xxiii
Figures
Figure 7-1Port Security 7-3
Figure 8-1Selecting ACL Type 8-3
Figure 8-2ACL Configuration - Standard IPv4 8-4
Figure 8-3ACL Configuration - Extended IPv4 8-6
Figure 8-4ACL Configuration - MAC 8-8
Figure 8-5Selecting ACL Mask Types 8-9
Figure 8-6ACL Mask Configuration - IP 8-11
Figure 8-7ACL Mask Configuration - MAC 8-12
Figure 8-8ACL Port Binding 8-14
Figure 9-1Port - Port Information 9-1
Figure 9-2Port - Port Configuration 9-5
Figure 9-3Static Trunk Configuration 9-7
Figure 9-4LACP Trunk Configuration 9-9
Figure 9-5LACP - Aggregation Port 9-11
Figure 9-6LACP - Port Counters Information 9-13
Figure 9-7LACP - Port Internal Information 9-15
Figure 9-8LACP - Port Neighbors Information 9-16
Figure 9-9Port Broadcast Control 9-18
Figure 9-10Mirror Port Configuration 9-19
Figure 9-11Rate Limit Configuration 9-20
Figure 9-12Port Statistics 9-24
Figure 10-1Static Addresses 10-1
Figure 10-2Dynamic Addresses 10-3
Figure 10-3Address Aging 10-4
Figure 11-1STA Information 11-4
Figure 11-2STA Global Configuration 11-9
Figure 11-3STA Port Information 11-12
Figure 11-4STA Port Configuration 11-15
Figure 11-5MSTP VLAN Configuration 11-17
Figure 11-6MSTP Port Information 11-19
Figure 11-7MSTP Port Configuration 11-21
Figure 12-1Globally Enabling GVRP 12-4
Figure 12-2VLAN Basic Information 12-4
Figure 12-3VLAN Current Table 12-5
Figure 12-4VLAN Static List - Creating VLANs 12-7
Figure 12-5VLAN Static Table - Adding Static Members 12-8
Figure 12-6VLAN Static Membership by Port 12-9
Figure 12-7VLAN Port Configuration 12-11
Figure 12-8Tunnel Port Configuration 12-16
Figure 12-9Private VLAN Status 12-17
Figure 12-10 Private VLAN Link Status 12-18
Figure 12-11 Protocol VLAN Configuration 12-19
Figure 12-12 Protocol VLAN Port Configuration 12-20
Figure 13-1Default Port Priority 13-2
Figure 13-2Traffic Classes 13-4
xxiv
Figures
Figure 13-3Queue Mode 13-5
Figure 13-4Queue Scheduling 13-6
Figure 13-5IP Precedence/DSCP Priority Status 13-8
Figure 13-6IP Precedence Priority 13-9
Figure 13-7IP DSCP Priority 13-10
Figure 13-8IP Port Priority Status 13-11
Figure 13-9IP Port Priority 13-12
Figure 14-1Configuring Class Maps 14-4
Figure 14-2Configuring Policy Maps 14-7
Figure 14-3Service Policy Settings 14-8
Figure 15-1IGMP Configuration 15-4
Figure 15-2Multicast Router Port Information 15-5
Figure 15-3Static Multicast Router Port Configuration 15-6
Figure 15-4IP Multicast Registration Table 15-7
Figure 15-5IGMP Member Port Table 15-8
Figure 15-6MVR Global Configuration 15-10
Figure 15-7MVR Port Information 15-11
Figure 15-8MVR Port Configuration 15-13
Figure 15-9MVR Group IP Information 15-14
Figure 15-10 MVR Group Member Configuration 15-15
Figure 16-1DNS General Configuration 16-2
Figure 16-2DNS Static Host Table 16-4
Figure 16-3DNS Cache 16-5
xxv
Figures
xxvi
Section I: Getting Started
This section provides an overview of the switch, and introduces some basic
concepts about network switches. It also describes the basic settings required to
access the management interface.
This switch provides a broad range of features for Layer 2 switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by this
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Key Features
Table 1-1 Key Features
FeatureDescription
Configuration Backup
and Restore
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
Access Control ListsSupports IP or MAC ACLs
DHCP ClientSupported
DNS Client and proxy service
Port ConfigurationSpeed and duplex mode and flow control
Rate LimitingInput and output rate limiting per port
Port MirroringSingle session, one source port to one analysis port
Port TrunkingSupports up to 12 trunks per unit, using either static or dynamic trunking (LACP)
Storm ControlBroadcast and multicast storm control
Unknown Packet
Blocking
Address TableUp to 4K MAC addresses in the forwarding table, 1024 static MAC addresses
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree
Algorithm
Backup to TFTP server
Web – HTTPS
Telnet – SSH
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Port – IEEE 802.1X, MAC address filtering
Fast Ethernet ports - 157 rules, 4 masks shared by 8-port groups
Gigabit Ethernet ports - 29 rules, 4 masks
Input rate limiting per port per CoS value
Blocks multicast or unicast packets with unknown MAC address
Supported to ensure wire-speed switching while eliminating bad frames
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and Multiple
Spanning Trees (MSTP)
1-1
Introduction
1
Table 1-1 Key Features (Continued)
FeatureDescription
Virtual LANsUp to 255 using IEEE 802.1Q, port-based, protocol-based VLANs, private VLANs,
Traffic PrioritizationDefault port priority, VLAN priority, traffic class map, queue scheduling, IP
Qualify of ServiceSupports Differentiated Services (DiffServ)
Multicast FilteringSupports IGMP snooping and query, as well as Multicast VLAN Registration
TunnelingSupports IEEE 802.1Q tunneling (QinQ)
and QinQ tunneling
Precedence, or Differentiated Services Code Point (DSCP), and TCP/UDP Port
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Untagged (port-based), tagged, and protocol-based VLANs,
plus support for automatic GVRP VLAN registration provide traffic security and
efficient use of network bandwidth. CoS priority queueing ensures the minimum
delay for moving real-time multimedia data across the network. While multicast
filtering provides support for real-time network applications. Some of the
management features are briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then uses the EAP between the switch
and the authentication server to verify the client’s right to access the network via an
authentication server (i.e., RADIUS server).
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection,
SNMP Version 3, IP address filtering for SNMP/web/Telnet management access.
MAC address filtering and IP source guard also provide authenticated port access.
While DHCP snooping is provided to prevent malicious attacks from unsecure ports.
1-2
Loading...
+ 526 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.