Cisco EtherSwitch Service Modules Feature Guide
Information About the Cisco EtherSwitch Service Modules
•Voice VLAN for creating subnets for voice traffic from Cisco IP phones.
•VLAN 1 minimization for reducing the risk of
Security Features
Note The Kerberos feature listed in this section is available only on the cryptographic versions of the Cisco EtherSwitch service module software image.
•
•Multilevel security for a choice of security level, notification, and resulting actions
•Static MAC addressing for ensuring security
•Protected port option for restricting the forwarding of traffic to designated ports on the same Cisco EtherSwitch service module
•Port security option for limiting and identifying MAC addresses of the stations allowed to access the port
•Port security aging to set the aging time for secure addresses on a port
•BPDU guard for shutting down a Port
•Standard and extended IP access control lists (ACLs) for defining security policies in both directions on routed interfaces (router ACLs) and VLANs and inbound on Layer 2 interfaces (port ACLs)
•Extended MAC access control lists for defining security policies in the inbound direction on Layer 2 interfaces
•VLAN ACLs (VLAN maps) for providing
•Source and destination
•DHCP snooping to filter untrusted DHCP messages between untrusted hosts and DHCP servers
•IEEE 802.1x
–802.1x with VLAN assignment for restricting
–802.1x with port security for controlling access to 802.1x ports
–802.1x with voice VLAN to permit IP phone access to the voice VLAN regardless of the authorized or unauthorized state of the port
–802.1x with guest VLAN to provide limited services to
•TACACS+, a proprietary feature for managing network security through a TACACS server
•RADIUS for verifying the identity of, granting access to, and tracking the actions of remote users through authentication, authorization, and accounting (AAA) services
Cisco IOS Release 12.2(25)SEC
9