User manual

C
HAPTER
1
| Introduction
Description of Software Features
– 24 –
ES-2000 Series
DESCRIPTION OF SOFTWARE FEATURES
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Broadcast storm suppression prevents
broadcast traffic storms from engulfing the network. Untagged (port-
based) and tagged VLANs provide traffic security and efficient use of
network bandwidth. CoS priority queueing ensures the minimum delay for
moving real-time multimedia data across the network. While multicast
filtering provides support for real-time network applications.
Some of the management features are briefly described below.
CONFIGURATION
BACKUP AND
RESTORE
You can save the current configuration settings to a file on the
management station (using the web interface), and later download this file
to restore the switch configuration settings.
AUTHENTICATION This switch authenticates management access via a web browser. User
names and passwords can be configured locally or can be verified via a
remote authentication server (i.e., RADIUS or TACACS+). Port-based
authentication is also supported via the IEEE 802.1X protocol. This protocol
uses Extensible Authentication Protocol over LANs (EAPOL) to request user
credentials from the 802.1X client, and then uses the EAP between the
switch and the authentication server to verify the client’s right to access
the network via an authentication server (i.e., RADIUS or TACACS+
server).
Other authentication options include HTTPS for secure management access
via the web, SNMP Version 3, IP address filtering for web/SNMP
management access, and MAC address filtering for port access.
ACCESS CONTROL
LISTS
ACLs provide packet filtering for IP frames (based on address, protocol,
TCP/UDP port number or TCP control code) or any frames (based on MAC
address or Ethernet type). ACLs can be used to improve performance by
blocking unnecessary network traffic or to implement security controls by
restricting access to specific network resources or protocols.
Link Layer Discovery
Protocol
Used to discover basic information about neighboring devices
Multicast Filtering Supports IGMP snooping and query
Table 1: Key Features (Continued)
Feature Description