Enterasys ANG-1000 Manual de usuario Pagina 5

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 8
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 4
Page 5
Switching/VLAN Services
s 'ENERIC 6,!. 2EGISTRATION 0ROTOCOL '620
s U &AST %THERNET
s AB 'IGABIT %THERNET COPPER
s Z 'IGABIT %THERNET lBER
s AE  'IGABIT %THERNET lBER
s 1 6,!.S
s $ -!# "RIDGES
s 0ROVIDER "RIDGES )%%% AD 2EADY
s W 2APID RECONVERGENCE OF 3PANNING
Tree
s S -ULTIPLE 3PANNING 4RE E
s AD ,INK !GGREGATION
s AE 'IGABIT %THERNET
s X &LOW #ONTROL
s )0 -ULTICAST )'-0 SUPPORT V V V PER
VLAN querier offload)
s *UMBO 0ACKET WITH -45 $ISCOVERY 3UPPORT
FOR 'IGABIT
s ,INK &LAP $ETECTION
s $YNAMIC %GRESS !UTOMATED 6,!. 0ORT
Configuration)
s 3AB ,,$0-%$
Standard IP Routing Features
s 3TATIC 2OUTES
s 3TANDARD !#,S
s /30& WITH -ULTIPATH 3UPPORT
s /30& 0ASSIVE )NTERFACES
s )0V 2OUTING )0V 2OUTING #APABLE
s %XTENDED !#,S
s 0OLICYBASED 2OUTING
s 2&#  )#-0
s 2&#  !20
s 2&#  0ROXY !20
s 2&#  )'-0
s 2&#  #)$2
s 2&# 2&#  /30&V
s 2&#  /30&V .33!
s 2&#  /30& )NTERACTIONS
s 2&#  /30& )NTERACTIONS
s 2&#  /30& $ATABASE /VERmOW
s $6-20 V
s 2&#  'ENERAL 2OUTING
s 2&#  3.40V FOR )0V )0V /3)
s 2&#  2)0)) -$ !UTHENTICATION
s 2&#  )0 &ORWARDING 4AB LE -)"
s 2&#  $(#0 3ERVER 2ELAY
s 2&#  /30& WITH $IGITAL 3IGNATURES
s 2&#  )'-0V
s 2&#  /30&V
s 2&#  /30& 3TANDARDIZATION 2EPORT
s 2&#  6220
s 2&#  0ROTOCOL )NDEPENDENT -ULTICAST
3PARSE -ODE
s 2&#  !DDRESS NOTATION COMPRESSION
s 2&#  2)0V
s 2&#  )0V 3PECIlCATION
s 2&#  .EIGHBOR $ISCOVERY )0V
s 2&#  )0V 3TATELESS !DDRESS
Autoconfiguration
s 2&#  4RA NS MI SS IO N OF )0V OVER
Ethernet
s 2&#  $3 &IELD DElNITION IN )0VV
Headers
s 2&#  -,$V
s 2&#  )0V 2OUTER !LERT /PTION
s 2&#  2OUTER 2ENUMBERING
s 2&#  /30& .33! /PTION
s 2&#  /30& 3TUB 2OUTER !DVERTISEMENT
s 2&#  )'-0V
s 2&#  3.-0 !RCHITECTURE FOR
-ANAGEMENT &RAMEWORKS
s 2&#  -ESSAGE 0ROCESSING AND
$ISPATCHING FOR 3.-0
s 2&#  3.-0 !PPLICATIONS
s 2&#  3.-0 !RCHITECTURE FOR
-ANAGEMENT &RAMEWORKS
s 2&#  -ESSAGE 0ROCESSING AND
$ISPATCHING FOR 3.-0
s 2&#  3.-0 !PPLICATIONS
s 2&#  !NYCAST 20 USING 0)-
s 2&# !LTERNATIVE )MPLEMENTATIONS OF
/30& !"2S
s 2&#  )0V !DDRESSING !RCHITECTURE
s 2&#  -,$ -ULTICAST ,ISTENER $ISCOVERY
2&# !NYCAST 20 USING 0)- AND -3$0
s 2&# !LTERNATIVE )MPLEMENTATIONS OF
/30& !"2S
s 2&#  )0V !DDRESSING !RCHITECTURE
s 2&#  -,$ -ULTICAST ,ISTENER $ISCOVERY
s 2&#  4EX TU AL #ONVENTIONS FOR )0V
Flow Label
s 2&#  'RACEFUL /30& 2ESTART
s 2&#  .ETWORK )NGRESS &ILTERING
s 2&#  6220
s 2&#  -,$V
s 2&#  )0V 3COPED !DDRESS !RCHITECTURE
s 2&#  'RACEFUL /30& 2ESTART
)MPLEMENTATION 2EPORT
s 2&#  0RIORITIZED 4RE AT ME NT OF /30&V
Packets
s 2&#  )0 6ERSION !DDRESSING
Architecture
s 2&#  )'-0 3NOOPING
s 2&#  !UTHENTICATION #ONlDENTIALITY
FOR /30&V
s 2&#  0)-3-
s 2&#  0)-3- )%4& 0ROPOSED 3TD 2EQ
Analysis
s 2&#  )'-0V AND -,$V
s 2&#  3OURCE3PECIlC -ULTICAST FOR )0
s 2&#  0)-33- IN 
s 2&#  !NYCAST20 5SING 0)-
s 2&#  .EIGHBOR $ISCOVERY FOR )0V
s 2&#  /!- &UNCTIONS ON %THERNET,IKE
Interfaces
s 2&#  %XTENDED )#-0 -ULTI0ART
-ESSAGES
s 2&#  "32 FOR 0)-
s 2&#  0)- -)"
s 2&# )'-0V-,$V-#!34 2OUTING
Protocol Interaction
s 2&#  /30&V 'RACEFUL 2ESTART
s 2&#  0)- "OOTSTRAP 2OUTER -)"
s 2&#  /30& /PAQUE ,3! /PTION
s 2&#  /30& FOR )0V
s 2&#  6220 6ERSION
Class of Service
s 3TRICT 0RIORITY 1UEUING
s 7EIGHTED &AIR 1UEUING WITH 3HAPING
s  4RA NS MI T 1UEUES PER 0ORT
s 0ACKET #OUNT OR "ANDWIDTH BASED 2ATE
,IMITERS "ANDWIDTH 4HRESHOLDS BETWEEN 
+BPS AND 'BPS
s )0 4O3 $ 3# 0 -ARKING2EMARKING
s $ 0RIORITYTO4RANSMIT 1UEUE -APPING
Network Security and Policy
Management
s 8 0ORTBASED !UTHENTICATION
s 7EBBASED !UTHENTICATION
s -!#BASED !UTHENTICATION
s #ONVERGENCE %NDPOINT $ISCOVERY WITH
$YNAMIC 0OLICY -APPING
3IEMENS (&! #ISCO 6O)0 ( AND 3)0
s -ULTIPLE !UTHENTICATION 4YP ES PER 0ORT
Simultaneously
s -ULTIPLE !UTHENTICATED USERS PER PORT WITH
unique policies per user/End System (VLAN
association independent)
s 2&#  )%%%  2!$)53 5SAGE
'UIDELINES WITH 6,!. TO 0OLICY -APPING
s 7ORM 0REVENTION &LOW 3ET5P 4HROTTLING
s "ROADCAST 3UPPRESSION
s !20 3TORM 0REVENTION
s -!#TO0ORT ,OCKING
s 3PAN 'UARD 3PANNING 4RE E 0ROTECTION
s "EHAVIORAL !NOMALY $ETECTION&LOW #OLLECTOR
(non-sampled Netflow)
s 3TATIC -ULTICAST 'ROUP 0ROVISIONING
s -ULTICAST 'ROUP 3ENDER AND 2ECEIVER 0OLICY
Control
Management, Control and Analysis
s 3.-0 VVCV
s 7EBBASED -ANAGEMENT )NTERFACE
s )NDUSTRY #OMMON #OMMAND ,INE )NTERFACE
3TANDARDS AND 0ROTOCOLS
Vista de pagina 4
1 2 3 4 5 6 7 8

Comentarios a estos manuales

Sin comentarios