
4
1.1.33.Flooding to mRouter Ports................................................................................................................................24
1.1.34.IGMP Snooping Querier ....................................................................................................................................24
1.1.35.Management and Control Plane ACLs ..............................................................................................................25
1.1.36.Remote Switched Port Analyzer (RSPAN) .........................................................................................................25
1.1.37.Link Dependency...............................................................................................................................................25
1.1.38.IPv6 Router Advertisement Guard ....................................................................................................................25
1.1.39.FIP Snooping .....................................................................................................................................................26
1.1.40.ECN Support......................................................................................................................................................26
1.2. Security Features ................................................................................................................... 26
1.2.1. Configurable Access and Authentication Profiles .............................................................................................26
1.2.2. AAA Command Authorization...........................................................................................................................27
1.2.3. Password-protected Management Access .......................................................................................................27
1.2.4. Strong Password Enforcement .........................................................................................................................27
1.2.5. MAC-based Port Security ..................................................................................................................................27
1.2.6. RADIUS Client....................................................................................................................................................27
1.2.7. TACACS+ Client .................................................................................................................................................27
1.2.8. Dot1x Authentication (IEEE 802.1X) .................................................................................................................27
1.2.9. MAC Authentication Bypass .............................................................................................................................28
1.2.10.DHCP Snooping .................................................................................................................................................28
1.2.11.Dynamic ARP Inspection ...................................................................................................................................28
1.2.12.IP Source Address Guard...................................................................................................................................28
1.2.13.Service Prohibit Access .....................................................................................................................................28
1.3. Quality of Service Features .................................................................................................... 28
1.3.1. Access Control Lists (ACL) .................................................................................................................................29
1.3.2. ACL Remarks .....................................................................................................................................................29
1.3.3. ACL Rule Priority ...............................................................................................................................................29
1.3.4. Differentiated Service (DIffServ) .......................................................................................................................29
1.3.5. Class of Service (CoS) ........................................................................................................................................29
1.4. Management Features........................................................................................................... 29
1.4.1. Management Options.......................................................................................................................................29
1.4.2. Management of Basic Network Information....................................................................................................30
1.4.3. Dual Software Images ......................................................................................................................................30
1.4.4. File Management..............................................................................................................................................30
1.4.5. FTP File Management.......................................................................................................................................30
1.4.6. Malicious Code Detection .................................................................................................................................30
1.4.7. Automatic Installation of Firmware and Configuration....................................................................................30
1.4.8. Warm Reboot ...................................................................................................................................................31