HP A3100-24-PoE EI JD313A Datenbogen

Produktcode
JD313A
Seite von 13
3
• External redundant power supply: provides
high reliability
• Smart link: allows 50 ms failover between links
• Spanning Tree/MSTP, RSTP: provides
redundant links while preventing network loops
• Port trunking: provides higher switch-to-switch
throughput and link-level redundancy, with support
for standards-based link aggregation (IEEE
802.3ad); supports up to 13 trunks, each with up to
8 links (ports) per trunk
• Device Link Detection Protocol (DLDP):
monitors link connectivity and shuts down ports at
both ends if unidirectional traffic is detected,
preventing loops in STP-based networks
Layer 2 switching
• 8K MAC addresses: provide access to many
Layer 2 devices
• VLAN support and tagging: supports the IEEE
802.1Q, with 4094 simultaneous VLAN IDs;
supports port-based VLANs, MAC-based VLANs,
and protocol-based VLANs
• GARP VLAN Registration Protocol (GVRP):
allows automatic learning and dynamic assignment
of VLANs
• IEEE 802.1ad QinQ and Selective QinQ:
increase the scalability of an Ethernet network by
providing a hierarchical structure; connect multiple
LANs on a high-speed campus or metro network
• Gigabit Ethernet port aggregation: allows
grouping of ports to increase overall data
throughput to a remote device
• IGMP and MLD snooping: effectively controls
and manages the flooding of multicast packets in a
Layer 2 network
Layer 3 services
• ARP: determines the MAC address of another IP
host in the same subnet
• Dynamic Host Configuration Protocol
(DHCP): simplifies the management of large IP
networks and supports client and server
• Loopback interface address: defines an
address in Routing Information Protocol (RIP) and
OSPF that can always be reachable, improving
diagnostic capability
Security
• Access control lists (ACLs): provide IP Layer 2 to
Layer 4 traffic filtering; support global ACL, VLAN
ACL, and IPv6 ACL
• Multiple user authentication methods:
– IEEE 802.1X: industry-standard method of user
authentication using an IEEE 802.1X supplicant on
the client in conjunction with a RADIUS server
– Web-based authentication: similar to IEEE
802.1X, it provides a browser-based environment
to authenticate clients that do not support the IEEE
802.1X supplicant
– MAC-based authentication: client is
authenticated with the RADIUS server based on
the client's MAC address
• Identity-driven security and access control:
– Per-user ACLs: permits or denies user access to
specific network resources based on user identity
and time of day, allowing multiple types of users
on the same network to access specific network
services without risk to network security or
unauthorized access to sensitive data
– Automatic VLAN assignment: automatically
assigns users to the appropriate VLAN based on
their identities
• Secure management access: securely encrypts
all access methods (CLI, GUI, or MIB) through
SSHv2, SSL, and/or SNMPv3
• Secure File Transfer Protocol (FTP): allows
secure file transfer to and from the switch; protects
against unwanted file downloads or unauthorized
copying of switch configuration file
• Guest VLAN: similar to IEEE 802.1X, it provides a
browser-based environment to authenticated clients
• Endpoint Admission Defense (EAD): provides
security policies to users accessing a network
• Port security: allows access only to specified
MAC addresses, which can be learned or specified
by the administrator
• Port isolation: secures and adds privacy and
prevents malicious attackers from obtaining user
information
• STP BPDU port protection: blocks Bridge
Protocol Data Units (BPDUs) on ports that do not
require BPDUs, preventing forged BPDU attacks
• STP Root Guard: protects root bridge from
malicious attack or configuration mistakes
• DHCP protection: blocks DHCP packets from
unauthorized DHCP servers, preventing
denial-of-service attacks