Brocade FCX-2XG Data Sheet

Page of 8
Layer 2 switching
•  802.1s Multiple Spanning Tree
•  802.1x Authentication
•  Auto MDI/MDIX
•  BPDU Guard, Root Guard
•  Dual-Mode VLANs
•  Dynamic VLAN Assignment
•  Dynamic Voice VLAN Assignment
•  Fast Port Span
•  Flexible Static Multicast MAC Address
Configuration
•  GARP VLAN Registration Protocol
•  IGMP Snooping (v1/v2/v3)
•  Link Fault Signaling (LFS)
•  MAC Address Locking
•  MAC-Layer Filtering
•  MAC Learning Disable; Port Security
•  MLD Snooping (v1/v2)
•  Multi-device Authentication
•  Per VLAN Spanning Tree (PVST/PVST+/PVRST)
•  PIM–SM Snooping
•  Policy-controlled MAC-based VLANs
•  Port-based Access Control Lists
•  Port-based, ACL-based, MAC Filter-based, and
VLAN-based Mirroring
•  Port Loop Detection
•  Port Speed Downshift and Selective Auto-
negotiation
•  Private VLAN
•  Private VLANs and Uplink Switch
•  Protected Link Groups
•  Protocol VLAN (802.1v), Subnet VLAN
•  Remote Fault Notification (RFN)
•  Single-instance Spanning Tree
•  Single-link LACP
•  Trunk Groups
•  Trunk Threshold
•  UniDirectional Link Detection (UDLD)
Layer 3 routing
•  ECMP
•  Host routes
•  IPv4 Static Routes
•  Layer 3/Layer 4 ACLs RIP v1/v2 announce
•  OSPF v2
•  PIM-SM, PIM-SSM, PIM-DM
•  RIP v1/v2
•  Routed Interfaces
•  Route-only Support
•  Routing Between Directly Connected Subnets
•  Virtual Interfaces
•  Virtual Route Redundancy Protocol (VRRP)
Advanced 
functionality 
(included with – 
ADV models)
•  BGP
Metro features
•  Metro-Ring Protocol (v1, v2)
•  Virtual Switch Redundancy Protocol (VSRP)
•  VLAN Stacking (Q-in-Q)
•  VRRP, VRRP-E
•  Topology Groups
Quality of service
•  ACL Mapping and Marking of ToS/DSCP
•  ACL Mapping to Priority Queue
•  ACL Mapping to ToS/DSCP
•  Classifying and Limiting Flows Based on TCP Flags
•  DHCP Relay
•  DiffServ Support
•  Honoring DSCP and 802.1p
•  MAC Address Mapping to Priority Queue
•  QoS Queue Management using Weighted
Round Robin (WRR), Strict Priority (SP), and a
combination of WRR and SP
High availability
•  Redundant hot-swappable internal
power supplies
•  Hot-swappable fan assembly
•  Layer 3 VRRP protocol redundancy
•  Real-time state synchronization across the stack
•  Hitless failover from master to standby
stack controller
•  Protected link groups
•  Hot insertion and removal of stacked units
Traffic management
•  ACL-based inbound rate limiting and
traffic policies
•  Broadcast, multicast, and unknown unicast
rate limiting
•  Inbound rate limiting per port
•  Outbound rate limiting per port and per queue
Management
Management
and control
•  Auto Configuration
•  Configuration Logging
•  Digital Optical Monitoring
•  Display Log Messages on Multiple Terminals
•  Embedded Web Management
•  Embedded DHCP Server
•  Foundry Discovery Protocol (FDP)
•  Industry-Standard Command Line Interface (CLI)
•  Key-based activation of optional software features
•  Integration with HP OpenView for Sun Solaris, HP-
UX, IBM AIX, and Windows
•  Brocade Network Advisor
•  IronView Network Manager (INM) Version 3.2 or
later
•  MIB Support for MRP, Port Security, MAC
Authentication, and MAC-based VLANs
•  Out-of-band Ethernet Management
•  RFC 783 TFTP
•  RFC 854 TELNET Client and Server
•  RFC 1157 SNMPv1/v2c
•  RFC 1213 MIB-II
•  RFC 1493 Bridge MIB
•  RFC 1516 Repeater MIB
•  RFC 1573 SNMP MIB II
•  RFC 1643 Ethernet Interface MIB
•  RFC 1643 Ethernet MIB
•  RFC 1724 RIP v1/v2 MIB
•  RFC 1757 RMON MIB
•  RFC 2068 Embedded HTTP
•  RFC 2131 DHCP Server and DHCP Relay
•  RFC 2570 SNMPv3 Intro to Framework
•  RFC 2571 Architecture for Describing SNMP
Framework
•  RFC 2572 SNMP Message Processing and
Dispatching
•  RFC 2573 SNMPv3 Applications
•  RFC 2574 SNMPv3 User-based Security Model
•  RFC 2575 SNMP View-based Access Control Model
SNMP
•  RFC 2818 Embedded HTTPS
•  RFC 3176 sFlow
•  SNTP Simple Network Time Protocol
•  Support for Multiple Syslog Servers
Embedded security
•  802.x Accounting
•  MAC Authentication
•  Bi-level Access Mode (Standard and EXEC Level)
•  EAP pass-through support
•  IEEE 802.1X username export in sFlow
•  Protection against Denial of Service (DoS) attacks
Secure management •  Authentication, Authorization, and Accounting (AAA)
•  Advanced Encryption Standard (AES) with SSHv2
•  RADIUS/TACACS/TACACS+
•  Secure Copy (SCP)
•  Secure Shell (SSHv2)
•  Username/Password
•  Web authentication