Cisco 2950SX 24 - Catalyst Switch - Stackable Instrukcja Użytkownika Strona 2

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 8
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 1
2 Cisco Product Catalog, April, 2003
Key Features and Benefits
Table 21-54: Catalyst 2950 Switches with SI Software — Features and Benefits
Feature Benefit
Availability
Superior Redundancy for Fault Backup IEEE 802.1D Spanning-Tree Protocol support for redundant backbone connections and loop-free networks
simplifies network configuration and improves fault tolerance.
Support for Cisco Spanning-Tree Protocol enhancements such as UplinkFast, BackboneFast, and PortFast
technologies ensure quick fail-over recovery enhancing overall network stability and availability.
Support for Cisco’s optional, 300-watt redundant AC power system provides a backup power source for up to
four units for improved fault tolerance and network uptime.
Provides unidirectional link detection (UDLD) and Aggressive UDLD for detecting and disabling
unidirectional links on fiber-optic interfaces caused by incorrect fiber-optic wiring or port faults.
Integrated Cisco IOS Features for
Bandwidth Optimization
Bandwidth aggregation through EtherChannel technology enhances fault tolerance and offers higher-speed
aggregated bandwidth between switches, to routers and individual servers. Port Aggregation Protocol (PAgP)
is available to simplify configuration.
Per-port broadcast, multicast, and unicast storm control prevents faulty end stations from degrading overall
systems performance.
Per virtual LAN (VLAN) Spanning-Tree Plus (PVST+) allows for Layer 2 load sharing on redundant links to
efficiently utilize the extra capacity inherent in a redundant design.
VLAN Trunking Protocol (VTP) pruning limits bandwidth consumption on VTP trunks by flooding broadcast
traffic only on trunk links required to reach the destination devices. Dynamic Trunking Protocol (DTP) enables
dynamic trunk configuration across all ports in the switch.
IGMP snooping provides for fast client joins and leaves of multicast streams and limits bandwidth-intensive
video traffic to only the requestors. MVR, IGMP filtering and fast-join and immediate leave are available as
enhancements.
Security
Network-Wide Security Features A private VLAN edge provides security and isolation between ports on a switch, ensuring that voice traffic
travels directly from its entry point to the aggregation device through a virtual path and cannot be directed to a
different port.
Support for the 802.1x standard allows users to be authenticated regardless of which LAN port they are
accessing, and provides unique benefits to customers who have a large base of mobile (wireless) users
accessing the network.
802.1x with voice VLAN to permit an IP phone access to the voice VLAN irrespective of the authorized or
unauthorized state of the port.
802.1x with port security for authenticating the port and managing network access for all MAC addresses,
including that of the client.
Port Security secures the access to a port based on the MAC address of a user’s device. The aging feature
removes the MAC address from the switch after a specific timeframe to allow another device to connect to the
same port.
MAC Address Notification allows administrators to be notified of new users added or removed from the
network.
Multilevel security on console access prevents unauthorized users from altering the switch configuration.
Trusted Boundary provides the ability to trust the QoS priority settings if an IP phone is present and disable the
trust setting in the event that the IP phone is removed, thereby preventing a rogue user from overriding
prioritization policies in the network.
TACACS+ and RADIUS authentication to enable centralized control of the switch and restrict unauthorized
users from altering the configuration.
SNMPv3 (non-crypto) monitors and controls network devices, manages configurations, statistics collection,
performance, and security
Cisco CMS Software Security Wizards ease the deployment of security features for restricting user access to a
server, a portion of the network, or access to the network.
QoS
Layer 2 QoS Support for reclassifying frames based either on 802.1p CoS value or default CoS value per port assigned by
network manager.
Four queues per egress port supported in hardware.
The WRR scheduling algorithm ensures that low-priority queues are not starved.
Strict priority queue configuration via Strict Priority Scheduling ensures that time-sensitive applications such
as voice always follow an expedited path through the switch fabric.
Przeglądanie stron 1
1 2 3 4 5 6 7 8

Komentarze do niniejszej Instrukcji

Brak uwag