Management Features - SMC Networks SMC TigerStack 1000 SMC8724M Management Manual

Smc networks gigabit ethernet switch management guide
Hide thumbs Also See for SMC TigerStack 1000 SMC8724M:
Table of Contents

Advertisement

D
S
F
ESCRIPTION OF
OFTWARE
EATURES
network applications. Some of the management features are briefly
described below.
Configuration Backup and Restore – You can save the current
configuration settings to a file on a TFTP server, and later download this
file to restore the switch configuration settings.
Authentication – This switch authenticates management access via the
console port, Telnet or Web browser. User names and passwords can be
configured locally or can be verified via a remote authentication server
(i.e., RADIUS or TACACS+). Port-based authentication is also supported
via the IEEE 802.1X protocol. This protocol uses the Extensible
Authentication Protocol over LANs (EAPOL) to request user credentials
from the 802.1X client, and then verifies the client's right to access the
network via an authentication server (i.e., RADIUS server).
Other authentication options include HTTPS for secure management
access via the web, SSH for secure management access over a
Telnet-equivalent connection, SNMP v3, IP address filtering for SNMP/
Web/Telnet management access, and MAC address filtering for port
access.
Access Control Lists – ACLs provide packet filtering for IP frames
(based on address, protocol, TCP/UDP port number or TCP control
code) or any frames (based on MAC address or Ethernet type). ACLs can
by used to improve performance by blocking unnecessary network traffic
or to implement security controls by restricting access to specific network
resources or protocols.
Port Configuration – You can manually configure the speed, duplex
mode, and flow control used on specific ports, or use auto-negotiation to
detect the connection settings used by the attached device. Use the
full-duplex mode on ports whenever possible to double the throughput of
switch connections. Flow control should also be enabled to control
network traffic during periods of congestion and prevent the loss of
1-3

Advertisement

Table of Contents
loading

Table of Contents