
© 2005 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 9 of 20
• Trusted Boundary provides the ability to trust the QoS priority settings if an IP phone is present and to
disable the trust setting if the IP phone is removed, thereby preventing a malicious user from overriding
prioritization policies in the network.
• Multilevel security on console access prevents unauthorized users from altering the switch configuration.
• The user-selectable address-learning mode simplifies configuration and enhances security.
• BPDU Guard shuts down Spanning Tree Protocol PortFast-enabled interfaces when BPDUs are received to
avoid accidental topology loops.
• Spanning-Tree Root Guard (STRG) prevents edge devices not in the network administrator's control from
becoming Spanning Tree Protocol root nodes.
• IGMP filtering provides multicast authentication by filtering out nonsubscribers and limits the number of
concurrent multicast streams available per port.
• Dynamic VLAN assignment is supported through implementation of VLAN Membership Policy Server
(VMPS) client functions to provide flexibility in assigning ports to VLANs. Dynamic VLAN helps enable
the fast assignment of IP addresses.
• Cisco Network Assistant software security wizards ease the deployment of security features for restricting
user access to a server as well as to a portion of or the entire network.
• One thousand access control entries (ACEs) are supported.
MANAGEABILITY
Superior Manageability
• Cisco IOS CLI support provides a common user interface and command set with all Cisco routers and Cisco
Catalyst desktop switches.
• Cisco Intelligent Power Management implements the IEEE 802.3af optional power classification features in
addition to Cisco enhancements to help enable the granular control of power delivery to each PoE port.
• Service Assurance Agent (SAA) support facilitates service-level management throughout the LAN.
• Switching Database Manager templates for access, routing, and VLAN deployment scenarios allow the
administrator to easily maximize memory allocation to the desired features based on deployment-specific
requirements.
• VLAN trunks can be created from any port, using either standards-based 802.1Q tagging or the Cisco Inter-
Switch Link (ISL) VLAN architecture.
• Up to 1024 VLANs per switch or stack and up to 128 spanning-tree instances per switch are supported.
• Four thousand VLAN IDs are supported.
• Voice VLAN simplifies telephony installations by keeping voice traffic on a separate VLAN for easier
administration and troubleshooting.
• Cisco VTP supports dynamic VLANs and dynamic trunk configuration across all switches.
• Cisco Group Management Protocol server functions help enable a switch to serve as the Cisco Group
Management Protocol router for client switches. EMI is required.
• IGMPv3 snooping provides fast client joins and leaves of multicast streams and limits bandwidth-intensive
video traffic to only the requestors.
• Remote SPAN (RSPAN) allows administrators to remotely monitor ports in a Layer 2 switch network from
any other switch in the same network.
• For enhanced traffic management, monitoring, and analysis, the Embedded Remote Monitoring (RMON)
software agent supports four RMON groups (history, statistics, alarms, and events).
• Layer 2 traceroute eases troubleshooting by identifying the physical path that a packet takes from source
to destination.
Komentáře k této Příručce