Description of software features, Description of software features -3 – SMC Networks SMC TigerAccess SMC7824M/FSW User Manual

Page 37

Advertising
background image

I

NTRODUCTION

1-3

Description of Software Features

The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Broadcast storm suppression prevents broadcast
traffic storms from engulfing the network. Untagged (port-based), tagged,
and protocol-based VLANs, plus support for automatic GVRP VLAN
registration provide traffic security and efficient use of network
bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering
provides support for real-time network applications. Some of the
management features are briefly described below.

Configuration Backup and Restore – You can save the current
configuration settings to a file on a TFTP server, and later download this
file to restore the switch configuration settings.

Authentication – This switch authenticates management access via the
console port, Telnet or web browser. User names and passwords can be
configured locally or can be verified via a remote authentication server (i.e.,
RADIUS or TACACS+). Port-based authentication is also supported via
the IEEE 802.1X protocol. This protocol uses Extensible Authentication
Protocol over LANs (EAPOL) to request user credentials from the 802.1X
client, and then uses the EAP between the switch and the authentication
server to verify the client’s right to access the network via an authentication
server (i.e., RADIUS server).

Other authentication options include HTTPS for secure management
access via the web, SSH for secure management access over a
Telnet-equivalent connection, SNMP Version 3, IP address filtering for
SNMP/web/Telnet management access. MAC address filtering and IP
source guard also provide authenticated port access. While DHCP
snooping is provided to prevent malicious attacks from unsecure ports.

Advertising