Table 1-1 Key Features (Continued)
Feature Description
Spanning Tree Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and Multiple
Algorithm Spanning Trees (MSTP)
Virtual LANs Up to 256 using IEEE 802.1Q, port-based, protocol-based, or private VLANs
Traffic Prioritization Default port priority, traffic class map, queue scheduling, IP Precedence, or
Differentiated Services Code Point (DSCP), and TCP/UDP Port
Qualify of Service Supports Differentiated Services (DiffServ)
Router Redundancy Router backup is provided with the Virtual Router Redundancy Protoco l (VRRP)
IP Routing Routing Information Protocol (RIP), Open Shortest Path First (OSPF), static routes
ARP Static and dynamic address configuration, proxy ARP
Multicast Filtering Supports IGMP snooping and query
Description of Software Features
The switch provides a wide range of advanced performance enhanc ing features .
Flow control eliminates the loss of packets due to bottlenecks caused by po rt
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Untagged (port-based), tagged, and protocol-based V LANs,
plus support for automatic GVRP VLAN registration provide traffic secu rit y and
efficient use of network bandwidth. CoS priority queueing ensures the minimum
delay for moving real-time multimedia data across the network. While mu lticast
filtering provides support for real-time network applications. Some of the
management features are briefly described below.
Configuration Backup and Restore
– You can save the current configuration
settings to a file on a TFTP serv er, and l ater d own load thi s f ile to resto re t he s witc h
configuration settings.
Authentication
– This switch authenticates management access v ia the co nso le
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then uses the EAP between the switc h
and the authentication server to verify the client ’s righ t to acces s the netw ork via an
authentication server (i.e., RADIUS server).
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection,
SNMP Version 3, IP address filtering for SNMP/web/Telnet management access,
and MAC address filtering for port access.

1-2

Introduction

1