User Guide

Table Of Contents
4 Contents
Single IP Management . . . . . . . . . . . . . . . 64
Master Failover with Transparent Transition
. . . . 65
Nonstop Forwarding on the Stack
. . . . . . . . . 65
Hot Add/Delete and Firmware Synchronization
. . 65
Security Features
. . . . . . . . . . . . . . . . . . . . 66
Configurable Access and Authentication Profiles
. 66
Password-Protected Management Access
. . . . 66
Strong Password Enforcement
. . . . . . . . . . . 66
TACACS+ Client
. . . . . . . . . . . . . . . . . . . 66
RADIUS Support
. . . . . . . . . . . . . . . . . . 67
SSH/SSL
. . . . . . . . . . . . . . . . . . . . . . . 67
Inbound Telnet Control
. . . . . . . . . . . . . . . 67
Denial of Service
. . . . . . . . . . . . . . . . . . 67
Port Protection
. . . . . . . . . . . . . . . . . . . 68
Captive Portal
. . . . . . . . . . . . . . . . . . . . 69
802.1X Authentication (IEEE 802.1X)
. . . . . . . . 69
MAC-Based 802.1X Authentication
. . . . . . . . . 70
802.1X Monitor Mode
. . . . . . . . . . . . . . . . 70
Port Security
. . . . . . . . . . . . . . . . . . . . 71
Access Control Lists (ACLs)
. . . . . . . . . . . . 71
Time-Based ACLs
. . . . . . . . . . . . . . . . . . 71
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . 72
DHCP Snooping
. . . . . . . . . . . . . . . . . . . 72
Dynamic ARP Inspection
. . . . . . . . . . . . . . 72
Protected Ports (Private VLAN Edge)
. . . . . . . . 72
Green Technology Features
. . . . . . . . . . . . . . . 74
Energy Detect Mode
. . . . . . . . . . . . . . . . 74
Energy Efficient Ethernet
. . . . . . . . . . . . . . 74
Power Utilization Reporting
. . . . . . . . . . . . . 74
Power over Ethernet (PoE) Features
. . . . . . . . . . . 75
PD Detection
. . . . . . . . . . . . . . . . . . . . 75