Vlan support, Security – Avaya C360 User Manual

Page 22

Advertising
background image

Avaya C360 Overview

22 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches, version 4.5

Stack redundancy - in the unlikely event that a C360 switch or Octaplane link should fail,
stack integrity is maintained if the redundant cable is connected to the stack. The broken
link is bypassed and data transmission continues uninterrupted.

BUPS (Backup Power Supply) - you can connect an additional DC power supply to the
BUPS connectors to ensure no disruption if the internal PSU fails. Refer to

Connecting a

BUPS

on page 53 for further information.

VLAN Support

Support for up to 3,071 VLANs (in the range of 1-3071) according to the IEEE 802.1Q
standard for assigning VLANs associated with appropriate network resources, traffic
patterns, and bandwidth. Refer to

VLANs

on page 117 for further information.

IEEE 802.1Q lets a VLAN span multiple switches. This provides management and control
of broadcast and multicast traffic and network security as well as all the other benefits of
VLANs over the entire network.

PVID - VLAN-per-port for maximum flexibility and security.

Multi VLAN binding (Multiple VLANs per port) allows access to shared resources by
stations that belong to different VLANs through the same port. Refer to

Multi VLAN

Binding

on page 119 for further information.

Ingress VLAN security accepts or rejects packets depending on their tagging and the
VLAN binding mode on the port. Refer to

Ingress VLAN Security

on page 121 for further

information.

Security

Password-protected access - three levels (read-only, read-write, and supervisor access) to
management interfaces for protection against unauthorized configuration changes. Refer
to

Security Levels

on page 60 for further information.

Access Control allows you to define which packets have access - based on the source or
destination address information in the packet or on other information in Layer 3 and Layer
4 (on routed packets only). Refer to

Policy Configuration

on page 180 for further

information.

IEEE 802.1x port-based authentication to prevent unauthorized devices (clients) from
gaining access to the network. Refer to

IEEE 802.1x (Port Based Network Access

Control)

on page 123 for further information.

802.1x with attribute assignments allows you to set VLAN ID, priority or multi-vlan binding
per user. Refer to

IEEE 802.1x (Port Based Network Access Control)

on page 123 for

further information.

Advertising