1-30
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
OL-25340-01
Chapter 1 Product Overview
Security Features
For information on WCCP, see Chapter 69, “Configuring WCCP Version 2 Services.”
Wireshark
Note Wireshark is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and
Catalyst 4500X-32.
Starting with Cisco IOS Release XE 3.3.0SG and the IP Base and Enterprise Services feature sets, the
Catalyst 4500 series switch supports Wireshark. This is a packet analyzer program, formerly known as
Ethereal that supports multiple protocols and presents information in a graphical and text-based user
interface. Wireshark is applied or enabled on an individual interface; global packet capture is not
supported.
For information on Wireshark, see Chapter 56, “Configuring Wireshark.”
XML-PI
eXtensible Markup Language Programmatic Interface (XML-PI) Release 1.0 leverages the Network
Configuration Protocol (NETCONF). It provides new data models that collect running configurations
and show command output down to the keyword level without requiring the technologies or external
XML-to-command line interface (CLI) gateways. XML-PI allows you to develop XML-based network
management applications to control any number of network devices simultaneously.
Refer to the following link for more details:
http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_xmlpi_v1.html
Security Features
The Catalyst 4500 series switch offers network management and control through the CLI or through
alternative access methods, such as SNMP. The switch software supports these security features:
• 802.1X Identity-Based Network Security, page 1-31
• Cisco TrustSec Security Architecture, page 1-32
• Cisco TrustSec MACsec Encryption, page 1-33
• Dynamic ARP Inspection, page 1-33
• Dynamic Host Configuration Protocol Snooping, page 1-33
• Flood Blocking, page 1-34
• Hardware-Based Control Plane Policing, page 1-34
• IP Source Guard, page 1-34
• IP Source Guard for Static Hosts, page 1-34
• Local Authentication, RADIUS, and TACACS+ Authentication, page 1-35
• Network Admission Control, page 1-35
• Network Security with ACLs, page 1-35