I
NTRODUCTION
1-3
Description of Software Features
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Broadcast storm suppression prevents broadcast
traffic storms from engulfing the network. Untagged (port-based), tagged,
and protocol-based VLANs, plus support for automatic GVRP VLAN
registration provide traffic security and efficient use of network
bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering
provides support for real-time network applications. Some of the
management features are briefly described below.
Configuration Backup and Restore
– You can save the current
configuration settings to a file on a TFTP server, and later download this
file to restore the switch configuration settings.
Authentication
– This switch authenticates management access via the
console port, Telnet or web browser. User names and passwords can be
configured locally or can be verified via a remote authentication server (i.e.,
RADIUS or ). Port-based authentication is also supported via
the IEEE 802.1X protocol. This protocol uses Extensible Authentication
Protocol over LANs (EAPOL) to request user credentials from the 802.1X
client, and then uses the EAP between the switch and the authentication
server to verify the client’s right to access the network via an authentication
server (i.e., RADIUS server).
Other authentication options include HTTPS for secure management
access via the web, SSH for secure management access over a
Telnet-equivalent connection, SNMP Version 3, IP address filtering for
SNMP/web/Telnet management access, and MAC address filtering for
port access.
Access Control Lists
– ACLs provide packet filtering for IP frames
(based on address, protocol, TCP/UDP port number or TCP control
code) or any frames (based on MAC address or Ethernet type). ACLs can
Summary of Contents for WPCI-G - annexe 1
Page 2: ......
Page 26: ...TABLE OF CONTENTS xxvi ...
Page 36: ...GETTING STARTED ...
Page 72: ...MANAGING SYSTEM FILES 2 24 ...
Page 74: ...SWITCH MANAGEMENT ...
Page 90: ...CONFIGURING THE SWITCH 3 16 ...
Page 245: ...SHOWING PORT STATISTICS 8 33 Figure 8 12 Port Statistics ...
Page 252: ...ADDRESS TABLE SETTINGS 9 6 ...
Page 318: ...CLASS OF SERVICE 12 16 ...
Page 330: ...QUALITY OF SERVICE 13 12 ...
Page 348: ...DOMAIN NAME SERVICE 15 8 ...
Page 404: ...IP ROUTING 17 44 ...
Page 406: ...COMMAND LINE INTERFACE ...
Page 608: ...MIRROR PORT COMMANDS 26 4 ...
Page 644: ...SPANNING TREE COMMANDS 29 28 ...
Page 668: ...VLAN COMMANDS 30 24 ...
Page 686: ...CLASS OF SERVICE COMMANDS 31 18 ...
Page 700: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 792: ...IP INTERFACE COMMANDS 36 50 ...
Page 818: ...APPENDICES ...
Page 824: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 828: ...TROUBLESHOOTING B 4 ...
Page 844: ...INDEX Index 6 ...
Page 845: ......