EasyManuals Logo
Home>Enterasys>Switch>Matrix-V V2H124-24

Enterasys Matrix-V V2H124-24 User Manual

Enterasys Matrix-V V2H124-24
498 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #32 background imageLoading...
Page #32 background image
Introduction
1-2
1
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Port-based and protocol-based VLANs, plus support for
automatic GVRP VLAN registration provide traffic security and efficient use of
network bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering provides
support for real-time network applications. Some of the management features are
briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based and MAC-based authentication is also supported via the IEEE 802.1x
protocol. This protocol uses the Extensible Authentication Protocol over LANs
(EAPOL) to request user credentials from the 802.1x client, and then verifies the
client’s right to access the network via an authentication server.
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection,
SNMP version 3, IP address filtering for SNMP/web/Telnet management access,
and MAC address filtering for port access.
Access Control Lists – ACLs provide packet filtering for IP frames (based on
address, protocol, TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can by used to improve
performance by blocking unnecessary network traffic or to implement security
controls by restricting access to specific network resources or protocols.
Multicast Filtering Supports IGMP snooping and query
AMAP Configures Alcatel Mapping Adjacency Protocol (AMAP) parameters and displays
information on attached AMAP-aware devices
Table 1-1. Key Features
(Continued)
Feature Description

Table of Contents

Other manuals for Enterasys Matrix-V V2H124-24

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Enterasys Matrix-V V2H124-24 and is the answer not in the manual?

Enterasys Matrix-V V2H124-24 Specifications

General IconGeneral
BrandEnterasys
ModelMatrix-V V2H124-24
CategorySwitch
LanguageEnglish

Related product manuals