Cisco 3550 12G - Catalyst Switch - Stackable Bedienungsanleitung Seite 3

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 11
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 2
Cisco Systems, Inc.
All contents are Copyright © 1992–2001 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 3 of 11
These features allow network administrators to prioritize
mission-critical and/or bandwidth-intensive traffic, such
as ERP (Oracle, SAP, etc.), voice (IP telephony traffic) and
CAD/CAM over less time-sensitive applications such as
FTP or email (SMTP). For example, it would be highly
undesirable to have a large file download destined to one
port on a wiring closet switch and have quality
implications such as increased latency in voice traffic,
destined to another port on this switch. This condition is
avoided by ensuring that voice traffic is properly classified
and prioritized throughout the network. Other
applications, such as web-browsing, can be treated as
low priority and handled on a best-efforts basis.
Sophisticated Traffic Management
The Catalyst 3550-12T is capable of performing rate
limiting via its support of the Cisco Committed Access
Rate (CAR) functionality. Through CAR, bandwidth
can be guaranteed in increments as low as 8K. Bandwidth
can be allocated based on several criteria including
MAC source address, MAC destination address, IP
source address, IP destination address, and TCP/UDP
port numbers. Bandwidth allocation is essential in
network environments requiring service-level agreements
or when it is necessary for the network manager to control
the bandwidth given to certain users. In addition to
CAR functionality, the Catalyst 3550-12T supports
128 aggregate or individual policers. This gives the
network administrator very granular control of the
LAN’s bandwidth.
Enhanced Security and Management
Through Integrated IOS Features
The Catalyst 3550-12T can offer enhanced data security
through the use of ACLs. By denying packets based on
source and destination MAC addresses, IP addresses, or
TCP/UDP ports, users can be restricted from sensitive
portions of the network. Also, due to the fact that all ACL
lookups are done in hardware, forwarding and routing
performance is not compromised when implementing
ACL-based security in the network.
Network managers can also implement higher levels of
data security and boost LAN performance by deploying
up to 1005 VLANs per switch. This ensures that data
packets are forwarded only to stations within a specific
VLAN, creating separate collision domains between
groups of ports on the network and reducing broadcast
transmission. VLAN trunks can be created from any port
using the standards-based 802.1Q or Cisco ISL VLAN
trunking architecture. In addition, Private VLAN Edge
provides security and isolation between ports on a switch,
ensuring that traffic travels directly from its entry point to
the aggregation device through a virtual path and cannot
be directed to a different port. Local Proxy ARP works in
conjunction with Private VLAN Edge to minimize
broadcasts and maximize available bandwidth. For
superior security management, the Catalyst 3550-12T
supports standard and extended access control lists
(ACLs) on VLAN ports as well as routed ports.
With the Catalyst 3550-12T Multilayer switch, network
managers can implement high levels of console security.
Multilevel access security on the switch console and the
web-based management interface prevents unauthorized
users from accessing or altering switch configuration.
Terminal Access Controller Access Control System
(TACACS+) authentication enables centralized access
control of the switch and restricts unauthorized users
from altering the configuration.
Seitenansicht 2
1 2 3 4 5 6 7 8 9 10 11

Kommentare zu diesen Handbüchern

Keine Kommentare