Users Guide

Table Of Contents
4 Contents
Single IP Management . . . . . . . . . . . . . . . 66
Master Failover with Transparent Transition
. . . . 67
Nonstop Forwarding on the Stack
. . . . . . . . . 67
Hot Add/Delete and Firmware Synchronization
. . 67
Security Features
. . . . . . . . . . . . . . . . . . . . 68
Configurable Access and Authentication Profiles
. 68
Password-Protected Management Access
. . . . 68
Strong Password Enforcement
. . . . . . . . . . . 68
TACACS+ Client
. . . . . . . . . . . . . . . . . . . 68
RADIUS Support
. . . . . . . . . . . . . . . . . . 69
SSH/SSL
. . . . . . . . . . . . . . . . . . . . . . . 69
Inbound Telnet Control
. . . . . . . . . . . . . . . 69
Denial of Service
. . . . . . . . . . . . . . . . . . 69
Port Protection
. . . . . . . . . . . . . . . . . . . 70
Captive Portal
. . . . . . . . . . . . . . . . . . . . 71
802.1X Authentication (IEEE 802.1X)
. . . . . . . . 71
MAC-Based 802.1X Authentication
. . . . . . . . . 72
802.1X Monitor Mode
. . . . . . . . . . . . . . . . 72
Port Security
. . . . . . . . . . . . . . . . . . . . 73
Access Control Lists (ACLs)
. . . . . . . . . . . . 73
Time-Based ACLs
. . . . . . . . . . . . . . . . . . 73
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . 74
DHCP Snooping
. . . . . . . . . . . . . . . . . . . 74
Dynamic ARP Inspection
. . . . . . . . . . . . . . 74
Protected Ports (Private VLAN Edge)
. . . . . . . . 74
Green Technology Features
. . . . . . . . . . . . . . . 75
Energy Detect Mode
. . . . . . . . . . . . . . . . 75
Energy Efficient Ethernet
. . . . . . . . . . . . . . 75
Power Utilization Reporting
. . . . . . . . . . . . . 76
Power over Ethernet (PoE) Features
. . . . . . . . . . . 76
PD Detection
. . . . . . . . . . . . . . . . . . . . 76