Nortel Ethernet Switch 425-48T + EU Power Cord AL2012B44-E5 用户手册

产品代码
AL2012B44-E5
下载
页码 10
4
Enterprise-sized 
MAC address table
The Ethernet Switch 425 switches support
up to 8,000 MAC addresses to support
ample scalability for growing networks to
accommodate many attached devices and
workgroups connected to each switch.
IGMP snooping
The Ethernet Switch 425 products from
Nortel feature IP Multicast support by
enabling the examination (‘snooping’) of
all Internet Group Multicast Protocol
(IGMPv1 and IGMPv2) traffic. This
function is performed in hardware and
enables the filtering out (dropping) of
multicast streams not of interest to
particular end stations, thereby enabling
peak computer performance. 
Spanning Tree Protocol
Built-in support for Spanning Tree
Protocol (IEEE 802.1D) detects and
eliminates logical loops in the network.
When multiple paths exist, the switch
will automatically place some ports on
standby to form a network with the most
efficient traffic pathways, avoiding the
formation of loops within the network.
Rapid Spanning Tree Protocol
Rapid Spanning Tree Protocol (RSTP 
or IEEE 802.1w) is a newer version of
IEEE 802.1D Spanning Tree that provides
a more rapid recovery from network
failures. In certain configurations, the
recovery time of RSTP can be reduced
to one second. RSTP also reduces the
amount of flooding in the network by
enhancing the way Topology Change
Notification (TCN) packet is generated.
Multiple Spanning 
Tree Protocol
Multiple Spanning Tree Protocol (MSTP
or IEEE 802.1s) allows you to configure
multiple instances of RSTP on the same
switch or stack. Each RSTP instance can
include one or more VLANs, thereby
enabling the configuration of multiple
spanning tree domains. 
Link Aggregation 
Control Protocol
Link Aggregation (LA or 802.3ad) allows
for the dynamic creation and manage-
ment of trunk groups. Network admin-
istrators can configure a trunk group
automatically through the use of the
Link Aggregation Control Protocol
(LACP). LACP is a dynamic protocol
defined by the IEEE 802.3ad standard
that allows a switch to learn the presence
and capabilities of another switch by
exchanging information before a trunk
group is formed. Either switch can
accept or reject the aggregation request
on a per-port basis. A link that cannot
join a trunk group can continue to
operate as an individual link.
802.3ad provides an industry-standard
method for bundling multiple links
together to form a single trunk between
two networking devices. Trunks that
conform to the 802.3ad standard are
Link Aggregation Groups (LAGs). The
maximum number of LACP-based trunk
groups on a switch (in either standalone
or stacked configuration) is six with a
maximum of four ports active for each
trunk group.
Multi-Link Trunking
Multi-Link Trunking (MLT) enables
grouping of links between an Ethernet
Switch 425 and another switch or a
server to provide greater bandwidth
with active redundant links. Nortel’s
unique Distributed Multi-Link Trunking
(DMLT) feature allows trunked ports to
span multiple units of the stack for
redundant connectivity to mission-crit-
ical servers and the network center. The
Ethernet Switch 425 supports up to six
MLT groups per switch or stack with up
to four ports per MLT.
Switch security
IEEE 802.1x 
For added security, Ethernet Switch 425
models support the 802.1x-based secu-
rity feature. Based on the IEEE 802.1x
standard, EAP limits access to the network
based on user credentials. A user is
required to “login” to the network using
a username/password; the user database
is maintained as a centralized authenti-
cation server, enabling common
management of users.
EAP prevents connectivity to the network
without password authorization for
added security and control. It is typically
used where access to the network is not
100 percent physically secure or where
physical security requires additional
enhancement. Some companies will
deploy EAP as standard for all network
ports to provide an added layer of
network defense, requiring that all users
are authenticated before access is granted.
EAP supports client access to the network
and interoperates with Microsoft
Windows XP and other compliant
802.1x clients.
MAC address-based security
BaySecure MAC address-based security
allows authentication of all access, not
only to the switches for management
and configurations, but also access to
the infrastructure through these switches.
This software feature limits access via
proper MAC address identification (up
to a maximum of 448).
Destination Address filtering
Destination Address filtering allows the
extension of the MAC address-based
security feature (BaySecure) to configure
the switch to drop all packets with spec-
ified MAC DAs. The Ethernet Switch
425 will support up to 10 specific MAC
DAs to be blocked due to security or
management requirements.