![](/images/backgrounds/127146/127146-33735x1.png)
Port Authentication and Security
For security, the switch allows authentication using IEEE 802.1x with an external RADIUS server and port security that allows only packets with dynamically learned MAC addresses and/or configured static MAC addresses to pass through a port on the switch.
VLAN Stacking
Use VLAN stacking to add an outer VLAN tag to the inner IEEE 802.1Q tagged frames that enter the network. By tagging the tagged frames
Differentiated Services (DiffServ)
With DiffServ, the switch marks packets so that they receive specific
Classifier and Policy
You can create a policy to define actions to be performed on a traffic flow grouped by a classifier according to specific criteria such as the IP address, port number or protocol type, etc.
Cluster Management
Cluster Management allows you to manage switches through one switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another using same cluster management implementation.
Maintenance and Management Features
•Access Control
You can specify the service(s) and computer IP address(es) to control access to the switch for management.
•Cluster Management
Cluster management (also known as iStacking) allows you to manage switches through one switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another.
•Configuration and Firmware Maintenance
You can backup or restore the switch configuration or upgrade the firmware on the switch.
Chapter 1 Getting to Know Your Switch | 33 |