
2 Cisco Product Catalog, June, 2002
• Redundant stacking connections provide support for a redundant loopback connection for top and bottom switches in an
independent stack backplane cascaded configuration.
• Command switch redundancy enabled in the Cisco Cluster Management Suite (CMS) Software allows customers to
designate a backup command switch that takes over cluster management functions if the primary command switch fails.
• Provides unidirectional link detection (UDLD) for detecting and disabling unidirectional links on fiber-optic interfaces
caused by incorrect fiber-optic wiring or port faults.
• Support for Cisco’s optional Redundant Power System 300 (RPS 300) that provides superior internal power source
redundancy for up to six Cisco networking devices resulting in improved fault tolerance and network uptime.
Integrated Cisco IOS Features for Bandwidth Optimization
• Bandwidth aggregation of up to 16 Gbps through Gigabit EtherChannel® technology and up to 1.6 Gbps through Fast
EtherChannel technology enhances fault tolerance and offers higher speed aggregated bandwidth between switches, to
routers and individual servers.
• Per-port broadcast, multicast, and unicast storm control prevents faulty end stations from degrading overall systems
performance.
• IEEE 802.1D Spanning-Tree Protocol support for redundant backbone connections and loop-free networks simplifies
network configuration and improves fault tolerance.
• Per VLAN Spanning Tree Plus (PVST+) allows for Layer 2 load sharing on redundant links to efficiently utilize the extra
capacity inherent in a redundant design.
• Equal cost routing for Layer 3 load balancing and redundancy -requires Enhanced Multilayer Software Image (EMI).
• Local Proxy ARP works in conjunction with private VLAN edge to minimize broadcasts and maximize available
bandwidth.
• VLAN Trunking Protocol (VTP) pruning limits bandwidth consumption on VTP trunks by flooding broadcast traffic only
on trunk links required to reach the destination devices.
• Internet Group Management Protocol (IGMP) snooping provides for fast client joins and leaves of multicast streams and
limits bandwidth-intensive video traffic to only the requestors.
• Multicast VLAN registration (MVR) continuously sends multicast streams in a multicast VLAN while isolating the
streams from subscriber VLANs for bandwidth and security reasons.
Security
Network-Wide Security Features
• IEEE 802.1x (planned future software support) for dynamic port-based security.
• Cisco security VLAN ACLs (VACLs) on all VLANs to prevent unauthorized data flows to be bridged within VLANs.
• Cisco standard and extended IP security Router ACLs (RACLs) for defining security policies on routed interfaces for
control plane and data plane traffic-requires Enhanced Multilayer Software Image (EMI).
• Time-based ACLs allow the implementation of security settings during specific periods of the day.
• Private VLAN edge provides security and isolation between ports on a switch, ensuring that voice traffic travels directly
from its entry point to the aggregation device through a virtual path and cannot be directed to a different port.
• TACACS+ and RADIUS (planned future software support) authentication to enable centralized control of the switch and
restrict unauthorized users from altering the configuration.
• MAC-based port-level security prevents unauthorized stations from accessing the switch (planned future software
support).
• Multilevel security on console access prevents unauthorized users from altering the switch configuration.
• The user-selectable address-learning mode simplifies configuration and enhances security.
Komentarze do niniejszej Instrukcji