System information
Introduction
1-2
1
Description of Software Features
The switch is a managed Gigabit switch that delivers performance and control to
your network. It provides 24 full-duplex 1000BASE-T ports that significantly improve
network performance and boost throughput using features configured through a
web-based management interface. With 48 Gigabits of throughput bandwidth, this
switch provides an effective solution to meeting the growing demands on your
network. Some of the management features are briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on the web management station, and later download this file to
restore the switch configuration settings.
Authentication – The switch supports port-based user authentication via the IEEE
802.1X protocol. This protocol uses the Extensible Authentication Protocol over
LANs (EAPOL) to request user credentials from the 802.1X client, and then verifies
the client’s right to access the network via an authentication server.
Access Control Lists – ACLs provide packet filtering for IP frames (based on IP
address). ACLs can be used to improve performance by blocking unnecessary
network traffic or to implement security controls by restricting access to specific
network resources or protocols.
Port Configuration – You can manually configure the speed, duplex mode, and
flow control used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports whenever
possible to double the throughput of switch connections. Flow control should also be
enabled to control network traffic during periods of congestion and prevent the loss
of packets when port buffer thresholds are exceeded. The switch supports flow
control based on the IEEE 802.3x standard.
Rate Limiting – This feature controls the maximum rate for traffic transmitted or
received on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within the rate limit is
transmitted, while packets that exceed the acceptable amount of traffic are dropped.
Port Mirroring – The switch can unobtrusively mirror traffic from any port to a
monitor port. You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
Port Trunking – Ports can be combined into an aggregate connection. The
additional ports dramatically increase the throughput across any connection, and
provide redundancy by taking over the load if a port in the trunk should fail. The
switch supports up to eight trunks.
Broadcast Storm Control – Broadcast suppression prevents broadcast traffic from
overwhelming the network. When enabled on a port, the level of broadcast traffic
passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it will be throttled until the level falls back beneath the threshold.