Operating instructions

16 Cisco Systems Intelligent Gigabit Ethernet Switch Module
򐂰 IEEE 802.1X port-based authentication with guest VLAN to provide limited services to
non-802.1X-compliant users
򐂰 Standard and extended IP access control lists (ACLs) for defining security policies
3.3.7 Quality of Service (QoS) and Class of Service (CoS)
This list represent the Quality of Service (QoS) and Class of Service (CoS) of the Cisco
Systems Intelligent Gigabit Ethernet Switch Module:
򐂰 Classification
IEEE 802.1p class of service (CoS) with eight priority queues on the Gigabit ports for
prioritizing mission-critical and time-sensitive traffic from data, voice, and telephony
applications.
IP Differentiated Services Code Point (IP DSCP) and CoS marking priorities on a
per-port basis for protecting the performance of mission-critical applications.
Flow-based packet classification (classification based on information in the MAC, IP,
and TCP/UDP headers) for high-performance QoS at the network edge, allowing for
differentiated service levels for different types of network traffic and for prioritizing
mission-critical traffic in the network.
Support for IEEE 802.1p CoS scheduling for classification and preferential treatment of
high-priority voice traffic.
򐂰 Egress policing and scheduling of egress queues
Four egress queues on all switch ports. Support for strict priority and weighted
round-robin (WRR) CoS policies.
3.3.8 Monitoring
This list represents the monitoring features of the Cisco Systems Intelligent Gigabit Ethernet
Switch Module:
򐂰 Switch LEDs that provide visual port and switch status
򐂰 Switch Port Analyzer (SPAN) and Remote Switch Port Analyzer (RSPAN) support for local
and remote monitoring of the network
򐂰 Four groups (history, statistics, alarms, and events) of embedded remote monitoring
(RMON) agents for network monitoring and traffic analysis
򐂰 MAC address notification for tracking the MAC addresses that the switch has learned or
removed
򐂰 Syslog facility for logging system messages about authentication or authorization errors,
resource issues, and time-out events
򐂰 Layer 2 traceroute to identify the physical path that a packet takes from a source device to
a destination device