Features Of The Switch - Alaxala AX2200S Series Configuration Manual

Table of Contents

Advertisement

1.2 Features of the Switch

(1) Unified lineup
Providing low-end switches
(2) Support for a wide range of high-speed VLAN functionality
Layer 2 VLAN functionality
Spanning Tree Protocols
(3) Robust security
Authentication and quarantine solutions
#1
#2
Unauthorized DHCP servers and terminals with fixed IP addresses are excluded
from networks.
The Switches cover network edges as low-end Ethernet Layer 2 switches and
provide consistent connectively, operability, and interoperability throughout
the AX series.
Gigabit Ethernet Layer 2 switch [AX2200S]
Fast Ethernet Layer 2 switch [AX1250S] [AX1240S]
Equipped with port-based VLAN, protocol-based VLAN, and MAC VLAN
functionality
Enables purpose-built VLANs
Supports the Spanning Tree Protocol (IEEE 802.1D), the Rapid Spanning
Tree Protocol (IEEE 802.1w), PVST+, and Multiple Spanning Tree (IEEE
802.1s)
Layer 2 authentication methods (IEEE 802.1X, Web authentication, and
MAC-based authentication) enable individual PCs to be authenticated and
placed into a VLAN, while maintaining the freedom of the physical
configuration at the network edges.
IEEE 802.1X port-based authentication (static) restricts and releases
communicable packets by using status monitoring, which gives permission for
full access communication only to terminals that conform to a security policy.
Secure Wake-on-LAN allows access to your PC from outside the company,
whether you are at home or on a business trip.You can use a Web browser to
access a Switch and, via the in-house network, turn on or off the power to a
desktop PC within the company
One-time password authentication linked with the RSA SecurID system is
used for Web authentication, so that network access security can be
increased. New PIN mode and Next token mode are also supported
Multistep authentication, which aims at granting access only to registered
users using legitimate terminals, is supported
To use this feature, a software option license must be purchased separately.
Authentication is conducted in two steps; first the terminal authentication
(MAC-based or IEEE 802.1X authentication) is conducted, and then the user
authentication (IEEE 802.1X or Web authentication) is conducted.
Strong security measures are provided via features such as DHCP snooping,
which eliminates unauthorized DHCP servers and terminals with fixed IP
1 Overview of the Switch
#1
.
#2
.
#1
.
3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ax1250s seriesAx1240s series

Table of Contents