Asante IntraCore 36000 Series User Manual Page 17

  • Download
  • Add to my manuals
  • Print
  • Page
    / 385
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 16
User’s Manual 17
Authentication – Permit management access through the console port, Telnet or web browser. User names
and passwords are configured locally or verified through a remote authentication server (RADIUS or
TACACS+). Port-based authentication is supported using the IEEE 802.1x protocol. This protocol uses the
Extensible Authentication Protocol over LANs (EAPOL) to request a user name and password from the
802.1x client, and then verifies the client’s right to access the network.
Other authentication options include HTTPS for secure management access through the web, SSH for
secure management access over a Telnet-equivalent connection, IP address filtering for SNMP/web/Telnet
management access, and MAC address filtering for port access.
Access Control Lists – Provide packet filtering for IP frames (based on address, protocol, TCP/UDP port
number or TCP control code) or any frames (based on MAC address or Ethernet type). Use ACLs to
improve performance by blocking unnecessary network traffic or to implement security controls by restricting
access to specific network resources or protocols.
Port Configuration – Configure the speed, duplex mode, and flow control used on specific ports, or use
auto-negotiation to detect the connection settings used by the attached device. Full-duplex mode doubles
the throughput of switch connections. Flow control manages network traffic during periods of congestion to
prevent the loss of packets when port buffer thresholds are exceeded. The switch supports flow control
based on the IEEE 802.3x standard.
Rate Limiting – Control the maximum rate for traffic transmitted or received on an interface. Rate limiting is
configured on interfaces at the edge of a network to limit traffic into or out of the network. Traffic that falls
within the rate limit is transmitted, while packets that exceed the acceptable amount of traffic are dropped.
Port Mirroring – Mirror traffic from any port to a monitor port. You can then attach a protocol analyzer or
RMON probe to this port to perform traffic analysis and verify connection integrity.
Port Trunking – Combine ports into an aggregate connection. Trunks can be manually set up or
dynamically configured using IEEE 802.3ad Link Aggregation Control Protocol (LACP). The additional ports
dramatically increase the throughput across any connection, and provide redundancy by taking over the load
if a port in the trunk should fail. The switch supports up to 6 trunks.
Broadcast Storm Control – Prevent broadcast traffic from overwhelming the network by managing the
level of broadcast traffic passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it is suppressed until it reaches the defined level.
Static Addresses – Increase network security by restricting access for a known host to a specific port. A
static address is assigned to a specific interface on this switch and are not moved. When a static address is
detected by another interface, the address is ignored and is not written to the address table.
IEEE 802.1D Bridge –Facilitates data switching by learning addresses, and then filtering or forwarding
traffic based on this information. The address table supports up to 16K addresses. The switch supports
IEEE 802.1D transparent bridging.
Store-and-Forward Switching – Copy each frame into memory before forwarding to another port. This
ensures that all frames are a standard Ethernet size and are verified for accuracy with the cyclic redundancy
check (CRC). This prevents bad frames from entering the network and wasting port bandwidth.
To avoid dropping frames on congested ports, the switch provides 1 MB for frame buffering. This buffer can
queue packets awaiting transmission on congested networks.
Spanning Tree Protocol – The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – Adds a level of fault tolerance by allowing two or more
redundant connections to be created between a pair of LAN segments. For multiple physical paths between
segments, this protocol chooses a single path and disables others to ensure that only one route exists
Page view 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 384 385

Comments to this Manuals

No comments