hit counter script

Vlan Features; Security Features - Cisco 3020 - Catalyst Blade Switch Configuration Manual

Cisco catalyst blade switch 3020 for hp software configuration guide, rel. 12.2(25)sef1
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:
Table of Contents

Advertisement

Chapter 1
Overview

VLAN Features

These are the VLAN features:

Security Features

The switch ships with these security features:
OL-8915-01
Optional spanning-tree features available in PVST+, rapid-PVST+, and MSTP mode:
Port Fast for eliminating the forwarding delay by enabling a port to immediately change from
the blocking state to the forwarding state
BPDU guard for shutting down Port Fast-enabled ports that receive bridge protocol data units
(BPDUs)
BPDU filtering for preventing a Port Fast-enabled port from sending or receiving BPDUs
Root guard for preventing switches outside the network core from becoming the spanning-tree
root
Loop guard for preventing alternate or root ports from becoming designated ports because of a
failure that leads to a unidirectional link
Flex Link Layer 2 interfaces to back up one another as an alternative to STP for basic link
redundancy
Link state tracking (Layer 2 trunk failover) to mirror the state of the external Ethernet links and to
allow the failover of the processor blade traffic to an operational external link on a separate Cisco
Ethernet switch
Support for up to 1024 VLANs for assigning users to VLANs associated with appropriate network
resources, traffic patterns, and bandwidth
Support for VLAN IDs in the 1 to 4094 range as allowed by the IEEE 802.1Q standard
VLAN Query Protocol (VQP) for dynamic VLAN membership
Inter-Switch Link (ISL) and IEEE 802.1Q trunking encapsulation on all ports for network moves,
adds, and changes; management and control of broadcast and multicast traffic; and network security
by establishing VLAN groups for high-security users and network resources
Dynamic Trunking Protocol (DTP) for negotiating trunking on a link between two devices and for
negotiating the type of trunking encapsulation (IEEE 802.1Q or ISL) to be used
VLAN Trunking Protocol (VTP) and VTP pruning for reducing network traffic by restricting
flooded traffic to links destined for stations receiving the traffic
Voice VLAN for creating subnets for voice traffic from Cisco IP Phones
VLAN 1 minimization for reducing the risk of spanning-tree loops or storms by allowing VLAN 1
to be disabled on any individual VLAN trunk link. With this feature enabled, no user traffic is sent
or received on the trunk. The switch CPU continues to send and receive control protocol frames.
Password-protected access (read-only and read-write access) to management interfaces (device
manager and the CLI) for protection against unauthorized configuration changes
Multilevel security for a choice of security level, notification, and resulting actions
Static MAC addressing for ensuring security
Protected port option for restricting the forwarding of traffic to designated ports on the same switch
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Features
1-5

Advertisement

Table of Contents
loading

Table of Contents