Description Of Software Features; Configuration Backup And Restore; Authentication - Edge-Core ES3510MA Management Manual

8-port layer 2 fast ethernet switch
Hide thumbs Also See for ES3510MA:
Table of Contents

Advertisement

| Introduction
C
1
HAPTER

Description of Software Features

D
S
ESCRIPTION OF
OFTWARE
C
ONFIGURATION
B
ACKUP AND
R
ESTORE
A
UTHENTICATION
Table 1: Key Features (Continued)
Feature
Description
Spanning Tree Algorithm
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
Multiple Spanning Trees (MSTP)
Virtual LANs
Up to 256 using IEEE 802.1Q, port-based, protocol-based, private
VLANs, voice VLANs, and QinQ tunnel
Traffic Prioritization
Default port priority, traffic class map, queue scheduling, IP
Precedence, or Differentiated Services Code Point (DSCP)
Qualify of Service
Supports Differentiated Services (DiffServ)
Link Layer Discovery
Used to discover basic information about neighboring devices
Protocol
Multicast Filtering
Supports IGMP snooping and query, and Multicast VLAN
Registration
F
EATURES
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Broadcast storm suppression prevents
broadcast traffic storms from engulfing the network. Untagged (port-
based), tagged, and protocol-based VLANs, plus support for automatic
GVRP VLAN registration provide traffic security and efficient use of network
bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering
provides support for real-time network applications.
Some of the management features are briefly described below.
You can save the current configuration settings to a file on the
management station (using the web interface) or an FTP/TFTP server
(using the web or console interface), and later download this file to restore
the switch configuration settings.
This switch authenticates management access via the console port, Telnet,
or a web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or
TACACS+). Port-based authentication is also supported via the IEEE
802.1X protocol. This protocol uses Extensible Authentication Protocol over
LANs (EAPOL) to request user credentials from the 802.1X client, and then
uses the EAP between the switch and the authentication server to verify
the client's right to access the network via an authentication server (i.e.,
RADIUS or TACACS+ server).
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for web/SNMP/Telnet/web
management access, and MAC address filtering for port access.
– 50 –

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents