Netgear GSM7224P-100NES Datasheet Page 8

  • Download
  • Add to my manuals
  • Print
  • Page
    / 36
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 7
ProSAFE® Intelligent Edge Managed Switches Data Sheet
M4100 series
Page 8 of 36
Modern access layer features highlights
Port names feature allows for descriptive names on all interfaces and better clarity in real word admin daily tasks
Loopback interfaces management for routing protocols administration
Private VLANs and local Proxy ARP help reduce broadcast with added security
Management VLAN ID is user selectable for best convenience
Industry-standard VLAN management in the command line interface (CLI) for all common operations such as VLAN creation; VLAN names; VLAN "make static"
for dynamically created VLAN by GRVP registration; VLAN trunking; VLAN participation as well as VLAN ID (PVID) and VLAN tagging for one interface, a group of
interfaces or all interfaces at once
System defaults automatically set per-port broadcast, multicast, and unicast storm control for typical, robust protection against DoS attacks and faulty clients which
can, with BYOD, oen create network and performance issues
IP Telephony administration is simplified with consistent Voice VLAN capabilities per the industry standards and automatic functions associated
Comprehensive set of "system utilities" and "Clear" commands help troubleshoot connectivity issues and restore various configurations to their factory defaults for
maximumadmineciency:traceroute(todiscovertheroutesthatpacketsactuallytakewhentravelingonahop-by-hopbasisandwithasynchronousresponse
when initiated from the CLI), clear dynamically learned MAC addresses, counters, IGMP snooping table entries from the Multicast forwarding database etc.
Allmajorcentralizedsowaredistributionplatformsaresupportedforcentralsowareupgradesandcongurationlesmanagement(HTTP,TFTP),includinginhighly
securedversions(HTTPS,SFTP,SCP)
Simple Network Time Protocol (SNTP) can be used to synchronize network resources and for adaptation of NTP, and can provide synchronized network timestamp
either in broadcast or unicast mode (SNTP client implemented over UDP - port 123)
EmbeddedRMON(4groups)andsFlowagentspermitexternalnetworktracanalysis
Engineered for convergence
Audio (Voice over IP) and Video (multicasting) comprehensive switching, filtering, routing and prioritization
Auto-VoIP,VoiceVLANandLLDP-MEDsupportforIPphonesQoSandVLANconguration
IGMPSnoopingforIPv4,MLDSnoopingforIPv6andQueriermodefacilitatefastreceiversjoinsandleavesformulticaststreamsandensuremulticasttraconly
reaches interested receivers without the need of a Multicast router
Multicast VLAN Registration (MVR) uses a dedicated Multicast VLAN to forward multicast streams and avoid duplication for clients in dierent VLANs
Schedule enablement
Enterprise security
TraccontrolMACFilterandPortSecurityhelprestrictthetracallowedintoandoutofspeciedportsorinterfacesinthesysteminordertoincreaseoverall
securityandblockMACaddressoodingissues
DHCPSnoopingmonitorsDHCPtracbetweenDHCPclientsandDHCPserverstolterharmfulDHCPmessageandbuildsabindingsdatabaseof(MACaddress,
IPaddress,VLANID,port)tuplesthatareconsideredauthorizedinordertopreventDHCPserverspoongattacks
IPsourceguardandDynamicARPInspectionusetheDHCPsnoopingbindingsdatabaseperportandperVLANtodropincomingpacketsthatdonotmatchany
bindingandtoenforcesourceIP/MACaddressesformalicioususerstracelimination
Layer 2/Layer 3-v4/Layer 3-v6/Layer 4 Access Control Lists (ACLs) can be binded to ports, Layer 2 interfaces, VLANs and LAGs (Link Aggregation Groups or Port
channel) for fast unauthorized data prevention and right granularity
Bridge protocol data unit (BPDU) Guard allows the network administrator to enforce the Spanning Tree (STP) domain borders and keep the active topology
consistentandpredictable-unauthorizeddevicesorswitchesbehindtheedgeportsthathaveBPDUenabledwillnotbeabletoinuencetheoverallSTPtopology
by creating loops
Spanning Tree Root Guard (STRG) enforces the Layer 2 network topology by preventing rogue root bridges potential issues when for instance, unauthorized or
unexpectednewequipmentinthenetworkmayaccidentallybecomearootbridgeforagivenVLAN
Page view 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 35 36

Comments to this Manuals

No comments