
Data Sheet
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 8
Category Feature/Benefit
Ease of Deployment,
Management, and
Replacement
Cisco Express Setup simplifies initial configuration with a Web browser, eliminating the need for
more complex terminal emulation programs.
Cisco Smartports templates provide the option to apply a default global or interface-level macro
with a recommended configuration, allowing the user to easily set up the switch in a
configuration optimized for the specific application.
Smartports templates for Ethernet/IP provide an optimized setup for these Industrial Ethernet
protocols at the touch of a button.
Swappable Flash memory is ideal for quick and easy switch replacement. Memory can be
moved from one switch to another, so a switch can be replaced without the need to reconfigure
software features.
The Common Industrial Protocol (CIP) management objects are supported. The including a
custom profile for primary Ethernet switch features. The Cisco IE3000 can be managed by CIP-
based management tools, allowing the user to manage an entire industrial automation system
with one tool.
PROFINET IO enables the Cisco IE3000 to exchange data, alarms and diagnostics information
with the PROFINET automation controllers and IO devices.
Simple Network Management Protocol (SNMP) (v1/v2/v3) support allows for management
using traditional IT-based management tools including CiscoWorks.
Cisco Network Assistant is a no-charge, Windows-based application that simplifies the
administration of networks of up to 250 users. It supports the Cisco IE3000 and a wide range of
Cisco Catalyst
®
intelligent switches. With Cisco Network Assistant, users can manage Cisco
Catalyst switches and launch the device managers of Cisco integrated services routers and
Cisco Aironet
®
WLAN access points. Configuration wizards need just a few user inputs to
automatically configure the switch to optimally handle different types of traffic: control, voice,
video, multicast, and high-priority data.
Availability and
Scalability
Virtual LANs (VLANs) allow for logical segmentation for a network for optimal use of bandwidth.
QoS classifies and prioritizes data, guaranteeing determinism for mission-critical data.
IGMPv3 snooping provides fast client joins and leaves of multicast streams and limits
bandwidth-intensive traffic to only the requestors. An additional querier allows this operation in a
Layer 2 only environment.
IGMP filtering provides multicast authentication by filtering out no subscribers and limits the
number of concurrent multicast streams available per port.
Per-port broadcast, multicast, and unicast storm control prevents faulty end stations from
degrading overall systems performance.
IEEE 802.1d Spanning Tree Protocol support for redundant backbone connections and loop-
free networks simplifies network configuration and improves fault tolerance.
Resilient Ethernet Protocol (REP) provides network redundancy of up to 200 nodes at a
convergence speed of 50ms or less.
Security
IEEE 802.1x with VLAN assignment, guest VLAN, and voice VLAN allows dynamic port-based
security, providing user authentication.
Port-based ACLs for Layer 2 interfaces allow application of security policies on individual switch
ports.
MAC address filtering prevents the forwarding of any type of packet with a matching MAC
address.
Secure Shell (SSH) Protocol v2 and SNMPv3 provide network security by encrypting
administrator traffic during Telnet and SNMP sessions. SSHv2 and the cryptographic version of
SNMPv3 require a special cryptographic software image because of U.S. export restrictions.
TACACS+ and RADIUS authentication enable centralized control of the switch and restrict
unauthorized users from altering the configuration.
MAC address notification allows administrators to be notified of users added to or removed from
the network.
Dynamic Host Configuration Protocol (DHCP) snooping allows administrators to help ensure
consistent mapping of IP to MAC addresses. This can be used to prevent attacks that attempt
to poison the DHCP binding database, and to rate limit the amount of DHCP traffic that enters a
switch port.
DHCP Interface Tracker (Option 82) augments a host IP address request with the switch port
ID.
Port security secures the access to an access or trunk port based on MAC address.
After a specific time frame, the aging feature removes the MAC address from the switch to allow
another device to connect to the same port.
Trusted Boundary provides the ability to trust the QoS priority settings if an IP phone is present
and to disable the trust setting if the IP phone is removed, thereby preventing a malicious user
from overriding prioritization policies in the network.
Up to 512 ACLs are supported, with two profiles: Security (384 Security ACL entries and 128
QoS policies), and QoS (128 Security ACL entries and 384 QoS polices).
Kommentare zu diesen Handbüchern