Security Control; Qos Guarantee - Zte ZXR10 2900 Series User Manual

Intelligent
Table of Contents

Advertisement

Security Control

The functions of security control are listed below.
1. User level security control is provided.
i. IEEE 802.1x implements dynamic and port-based security,
which provides the user ID authentication function.
ii. It supports MAC/IP/VLAN/PORT combination at random,
which prevents illegal user from accessing the network
effectively.
iii. Port isolation is helpful to make sure that users can not
monitor or access to other users on the same switch.
iv. DHCP monitoring prevents spiteful users deceiving the
server and sending spurious address, so it can start IP
source protection and create a binding table for the IP
address of the user, MAC address, ports and VLAN to
prevent user deceiving or using IP address of other users.
2. Equipment level security is provided.
i. CPU security control technology can resist DoS attack from
CPU.
ii. SSH/SNMPv3 protocol supplies network management se-
curity.
iii. Multilevel security of console can prevent unauthenticated
users changing the switch configuration.
iv. RADIUS identification authentication puts the switch un-
der the centralized control and prevents unauthorized user
from modifying configuration.
3. Network security control is provided.
i.
ACL
based on port or Trunk makes it possible for users to
apply security strategy to the ports of switches or Trunk.
ii. MAC address binding and the filter based on source or des-
tination provide effective flow control based on address.
iii. Port mirroring function provides an effective tool for net-
work management analysis.

QoS Guarantee

Applications of QoS are shown below:
1. Standard 802.1p CoS and DSCP field sort can be labeled and
sorted again based on single packet with source and desti-
nation IP address, source and destination MAC address, and
TCP/UDP port number.
2. It provides queue schedule algorithm: Strict Priority (SP) and
combination schedule (SP+WRR). Of which WRR is the abbre-
viation of Weighted Round Robin.
3. It supports Committed Access Rate (CAR) function. It man-
ages the asynchronous uplink and downlink data flow from end
Confidential and Proprietary Information of ZTE CORPORATION
Chapter 2 System Overview
5

Advertisement

Table of Contents
loading

Table of Contents