Secure FTP (SFTP): encrypts uploads and downloads of configuration file
Port security
Port securityPort security
Port security
: allows access only to specified MAC addresses, which can be learned or specified by the administrator
Dynamic IP lockdown
Dynamic IP lockdownDynamic IP lockdown
Dynamic IP lockdown
: works with DHCP protection to block traffic from unauthorized hosts, preventing IP source address
spoofing
DHCP protection
DHCP protectionDHCP protection
DHCP protection
: blocks DHCP packets from unauthorized DHCP servers, preventing denial-of-service attacks
Dynamic ARP protection
Dynamic ARP protectionDynamic ARP protection
Dynamic ARP protection
: blocks ARP broadcasts from unauthorized hosts, preventing eavesdropping or theft of network data
MAC address lockout
MAC address lockoutMAC address lockout
MAC address lockout
: prevents configured particular MAC addresses from connecting to the network
MAC address lockdown
MAC address lockdownMAC address lockdown
MAC address lockdown
: allows only specified MAC addresses access to the network on a specified port
Multiple user authentication methods
Multiple user authentication methodsMultiple user authentication methods
Multiple user authentication methods
:
IEEE 802.1X: industry-standard method of user authentication using an IEEE 802.1X supplicant on the client in
conjunction with a RADIUS server
Web-based authentication: similar to IEEE 802.1X, it provides a browser-based environment to authenticate clients that
do not support the IEEE 802.1X supplicant
MAC-based authentication: client is authenticated with the RADIUS server based on the client's MAC address
Authentication flexibility - 2 IEEE 802.1X
Authentication flexibility - 2 IEEE 802.1XAuthentication flexibility - 2 IEEE 802.1X
Authentication flexibility - 2 IEEE 802.1X
: provides authentication of multiple IEEE 802.1X users per port; prevents user
"piggybacking" on another user's IEEE 802.1X authentication
Protected ports
Protected portsProtected ports
Protected ports
: prevents designated ports from communicating with each other while allowing access to unprotected ports
Per-port broadcast throttling
Per-port broadcast throttlingPer-port broadcast throttling
Per-port broadcast throttling
: selectively configures broadcast control on heavy traffic port uplinks
Physical security
Physical securityPhysical security
Physical security
:
Front-panel buttons: provides the ability to disable reset and clear buttons on front panel for added security
Kensington Lock Slot: includes a Kensington Lock slot for securing the switches in open-space deployments
Spanning Tree Protocol Root Guard
Spanning Tree Protocol Root GuardSpanning Tree Protocol Root Guard
Spanning Tree Protocol Root Guard
: when running the spanning tree protocol, protects root bridge from malicious attack or
configuration mistakes
STP BPDU port protection
STP BPDU port protectionSTP BPDU port protection
STP BPDU port protection
: blocks Bridge Protocol Data Units (BPDUs) on ports that do not require BPDUs, preventing forged
BPDU attacks
Convergence
ConvergenceConvergence
Convergence
IP multicast snooping and data-driven IGMP
IP multicast snooping and data-driven IGMPIP multicast snooping and data-driven IGMP
IP multicast snooping and data-driven IGMP
: automatically prevents flooding of IP multicast traffic
LLDP-MED
LLDP-MEDLLDP-MED
LLDP-MED
(Media Endpoint Discovery): is a standard extension of LLDP that stores values for parameters such as QoS and
VLAN to automatically configure network devices such as IP phones
IEEE 802.1AB Link Layer Discovery Protocol
IEEE 802.1AB Link Layer Discovery ProtocolIEEE 802.1AB Link Layer Discovery Protocol
IEEE 802.1AB Link Layer Discovery Protocol
(LLDP): is an automated device discovery protocol for easy mapping by network
management applications
PoE allocations
PoE allocationsPoE allocations
PoE allocations
: support multiple methods (automatic, IEEE 802.3af class, LLDP-MED, or user specified) to allocate PoE
power for more efficient energy savings
Monitor and diagnostics
Monitor and diagnosticsMonitor and diagnostics
Monitor and diagnostics
Port mirroring
Port mirroringPort mirroring
Port mirroring
: enables traffic on a port to be simultaneously sent to a network analyzer for monitoring
Network tools
Network toolsNetwork tools
Network tools
: command-line interface includes telnet client, ping, traceroute, and Layer 2 link test tools for diagnostics
Logging
LoggingLogging
Logging
: local and remote logging of events via SNMP (v2c and v3) and syslog
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
: ingress and egress port monitoring enable network problem solving
Uni-Directional Link Detection
Uni-Directional Link DetectionUni-Directional Link Detection
Uni-Directional Link Detection
(UDLD): monitors a link between two switches and blocks the ports on both ends of the link if
the link goes down at any point between the two devices
Find-Fix-Inform
Find-Fix-InformFind-Fix-Inform
Find-Fix-Inform
: finds and fixes common network problems automatically, then informs administrator
RMON, XRMON, sFlow, and SMON
RMON, XRMON, sFlow, and SMONRMON, XRMON, sFlow, and SMON
RMON, XRMON, sFlow, and SMON
: provide advanced monitoring and reporting capabilities for statistics, history, alarms,
and events
Port monitoring for network threats
Port monitoring for network threatsPort monitoring for network threats
Port monitoring for network threats
: Provides sampled port traffic using sFlow technology to the HP Network Immunity
Manager application for Network Behavior Anomaly Detection (NBAD) analysis to detect threats and mitigate threats at the
port where the threat originated
Flexibility
FlexibilityFlexibility
Flexibility
QuickSpecs
HP E2915-8G-PoE Switch
HP E2915-8G-PoE SwitchHP E2915-8G-PoE Switch
HP E2915-8G-PoE Switch
Overview
DA - 13672 North America — Version 2 — September 13, 2010
Page 3