Cisco WS-C3560G-24PS-E Instrukcja Użytkownika Strona 9

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 19
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 8
© 2005 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 8 of 20
Feature Benefit
Asynchronous data flows upstream and downstream from the end station or on the uplink are easily managed
using ingress policing and egress shaping.
Up to 64 aggregate or individual policers are available per Fast Ethernet or Gigabit Ethernet port.
SECURITY
Networkwide Security Features
IEEE 802.1x allows dynamic, port-based security, providing user authentication.
IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific user regardless of
where the user is connected.
IEEE 802.1x with voice VLAN permits an IP phone to access the voice VLAN irrespective of the authorized
or unauthorized state of the port.
IEEE 802.1x and port security are provided to authenticate the port and manage network access for all MAC
addresses, including those of the client.
IEEE 802.1x with an ACL assignment allows for specific identity-based security policies regardless of
where the user is connected.
IEEE 802.1x with Guest VLAN allows guests without 802.1x clients to have limited network access on the
guest VLAN.
Cisco security VLAN ACLs (VACLs) on all VLANs prevent unauthorized data flows from being bridged
within VLANs.
Cisco standard and extended IP security router ACLs (RACLs) define security policies on routed interfaces
for control- and data-plane traffic.
Port-based ACLs (PACLs) for Layer 2 interfaces allow application of security policies on individual
switch ports.
Unicast MAC filtering prevents the forwarding of any type of packet with a matching MAC address.
Unknown unicast and multicast port blocking allows tight control by filtering packets that the switch has not
already learned how to forward.
SSHv2, Kerberos, and SNMPv3 provide network security by encrypting administrator traffic during Telnet
and SNMP sessions. SSHv2, Kerberos, and the cryptographic version of SNMPv3 require a special
cryptographic software image because of U.S. export restrictions.
Private VLAN Edge provides security and isolation between switch ports, helping ensure that users cannot
snoop on other users' traffic.
Bidirectional data support on the Switched Port Analyzer (SPAN) port allows the Cisco Secure Intrusion
Detection System (IDS) to take action when an intruder is detected.
TACACS+ and RADIUS authentication enable centralized control of the switch and restrict unauthorized
users from altering the configuration.
MAC address notification allows administrators to be notified of users added to or removed from the
network.
DHCP snooping allows administrators to ensure consistent mapping of IP to MAC addresses. This can be
used to prevent attacks that attempt to poison the DHCP binding database, and to rate limit the amount of
DHCP traffic that enters a switch port.
DHCP Interface Tracker (Option 82) augments a host IP address request with the switch port ID.
Port security secures the access to an access or trunk port based on MAC address.
After a specific timeframe, the aging feature removes the MAC address from the switch to allow another
device to connect to the same port.
Przeglądanie stron 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 18 19

Komentarze do niniejszej Instrukcji

Brak uwag