
2 Cisco Product Catalog, June, 2002
• Redundant stacking connections provide support for a redundant loopback connection for top and bottom switches in an
independent stack backplane cascaded configuration.
• Command switch redundancy enabled in the Cisco Cluster Management Suite (CMS) Software allows customers to
designate a backup command switch that takes over cluster management functions if the primary command switch fails.
• Provides unidirectional link detection (UDLD) for detecting and disabling unidirectional links on fiber-optic interfaces
caused by incorrect fiber-optic wiring or port faults.
Integrated Cisco IOS Features for Bandwidth Optimization
• Bandwidth aggregation up to 4 Gbps through Gigabit EtherChannel® technology enhances fault tolerance and offers
higher-speed aggregated bandwidth between switches, to routers and individual servers.
• Per-port broadcast, multicast, and unicast storm control prevents faulty end stations from degrading overall systems
performance.
• Per virtual LAN (VLAN) Spanning Tree Plus (PVST+) allows for Layer 2 load sharing on redundant links to efficiently
utilize the extra capacity inherent in a redundant design.
• Virtual Trunking Protocol (VTP) pruning limits bandwidth consumption on VTP trunks by flooding broadcast traffic only
on trunk links required to reach the destination devices.
• Internet Group Management Protocol (IGMP) snooping provides for fast client joins and leaves of multicast streams and
limits bandwidth-intensive video traffic to only the requestors.
• Multicast VLAN registration (MVR) continuously sends multicast streams in a multicast VLAN while isolating the
streams from subscriber VLANs for bandwidth and security reasons.
Security
Network-Wide Security Features
• Filtering of incoming traffic flows based on Layer 2, Layer 3 or Layer 4 access control parameters (ACPs) prevents
unauthorized data flows. Up to four ACPs are supported in configuring either QoS or security filters.
• The following Layer 2 ACPs or a combination can be used for security classification of incoming packets: source Media
Access Control (MAC) address, destination MAC address, and 16-bit Ethertype.
• The following Layer 3 and Layer 4 fields or a combination can be used for security classification of incoming packets:
source IP address, destination IP address, TCP source or destination port number, User Datagram Protocol (UDP) source,
or destination port number.
• A private VLAN edge provides security and isolation between ports on a switch, ensuring that voice traffic travels directly
from its entry point to the aggregation device through a virtual path and cannot be directed to a different port.
• Support for the 802.1x standard allows users to be authenticated regardless of which LAN port they are accessing, and
provides unique benefits to customers who have a large base of mobile (wireless) users accessing the network.
• Support for "secure ports" that prevents unauthorized stations from accessing the switch by restricting the number of
MAC addresses allowed to access the port. Up to 132 addresses can be configured per port.
• The user-selectable address-learning mode simplifies configuration and enhances security.
• Spanning-tree root guard (STRG) prevents edge devices not in the network administrator’s control from becoming
Spanning-Tree Protocol root nodes.
• The Spanning-Tree Protocol Port Fast/bridge protocol data unit (BPDU) guard feature disables access ports with
Spanning-Tree Protocol PortFast-enabled upon reception of a BPDU, and increases network reliability, manageability,
and security.
• Multilevel security on console access prevents unauthorized users from altering the switch configuration.
• Support for TACACS+ authentication enables centralized control of the switch and restricts unauthorized users from
altering the configuration.
Kommentare zu diesen Handbüchern