Users Guide

4 Contents
Stacking Features . . . . . . . . . . . . . . . . . . . . 70
Mixed and Single Series Stacking
. . . . . . . . . 70
Single IP Management
. . . . . . . . . . . . . . . 71
Master Failover with Transparent Transition
. . . . 71
Nonstop Forwarding on the Stack
. . . . . . . . . 72
Hot Add/Delete and Firmware Synchronization
. . 72
Security Features
. . . . . . . . . . . . . . . . . . . . 73
Configurable Access and Authentication
Profiles
. . . . . . . . . . . . . . . . . . . . . . . 73
Password-Protected Management Access
. . . . 73
Strong Password Enforcement
. . . . . . . . . . . 73
TACACS+ Client
. . . . . . . . . . . . . . . . . . . 73
RADIUS Support
. . . . . . . . . . . . . . . . . . 74
SSH/SSL
. . . . . . . . . . . . . . . . . . . . . . . 74
Inbound Telnet Control
. . . . . . . . . . . . . . . 74
Denial of Service
. . . . . . . . . . . . . . . . . . 74
Port Protection
. . . . . . . . . . . . . . . . . . . 75
Captive Portal
. . . . . . . . . . . . . . . . . . . . 76
802.1X Authentication (IEEE 802.1X)
. . . . . . . . 76
MAC-Based 802.1X Authentication
. . . . . . . . . 77
802.1X Monitor Mode
. . . . . . . . . . . . . . . . 77
Port Security
. . . . . . . . . . . . . . . . . . . . 77
Access Control Lists (ACLs)
. . . . . . . . . . . . 78
Time-Based ACLs
. . . . . . . . . . . . . . . . . . 78
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . 78
DHCP Snooping
. . . . . . . . . . . . . . . . . . . 79
Dynamic ARP Inspection
. . . . . . . . . . . . . . 79
Protected Ports (Private VLAN Edge)
. . . . . . . . 79
Green Technology Features
. . . . . . . . . . . . . . . 80
Energy Detect Mode
. . . . . . . . . . . . . . . . 80
Energy Efficient Ethernet
. . . . . . . . . . . . . . 80
Power Utilization Reporting
. . . . . . . . . . . . . 81