4
1.1.33. Flooding to mRouter Ports ................................................................................................................................ 24
1.1.34. IGMP Snooping Querier .................................................................................................................................... 24
1.1.35. Management and Control Plane ACLs .............................................................................................................. 25
1.1.36. Remote Switched Port Analyzer (RSPAN) ......................................................................................................... 25
1.1.37. Link Dependency ............................................................................................................................................... 25
1.1.38. IPv6 Router Advertisement Guard .................................................................................................................... 25
1.1.39. FIP Snooping ..................................................................................................................................................... 26
1.1.40. ECN Support ...................................................................................................................................................... 26
1.2. Security Features ................................................................................................................... 26
1.2.1. Configurable Access and Authentication Profiles ............................................................................................. 26
1.2.2. AAA Command Authorization ........................................................................................................................... 27
1.2.3. Password-protected Management Access ....................................................................................................... 27
1.2.4. Strong Password Enforcement ......................................................................................................................... 27
1.2.5. MAC-based Port Security .................................................................................................................................. 27
1.2.6. RADIUS Client.................................................................................................................................................... 27
1.2.7. TACACS+ Client ................................................................................................................................................. 27
1.2.8. Dot1x Authentication (IEEE 802.1X) ................................................................................................................. 27
1.2.9. MAC Authentication Bypass ............................................................................................................................. 28
1.2.10. DHCP Snooping ................................................................................................................................................. 28
1.2.11. Dynamic ARP Inspection ................................................................................................................................... 28
1.2.12. IP Source Address Guard ................................................................................................................................... 28
1.2.13. Service Prohibit Access ..................................................................................................................................... 28
1.3. Quality of Service Features .................................................................................................... 28
1.3.1. Access Control Lists (ACL) ................................................................................................................................. 29
1.3.2. ACL Remarks ..................................................................................................................................................... 29
1.3.3. ACL Rule Priority ............................................................................................................................................... 29
1.3.4. Differentiated Service (DIffServ) ....................................................................................................................... 29
1.3.5. Class of Service (CoS) ........................................................................................................................................ 29
1.4. Management Features ........................................................................................................... 29
1.4.1. Management Options ....................................................................................................................................... 29
1.4.2. Management of Basic Network Information .................................................................................................... 30
1.4.3. Dual Software Images ...................................................................................................................................... 30
1.4.4. File Management.............................................................................................................................................. 30
1.4.5. FTP File Management ....................................................................................................................................... 30
1.4.6. Malicious Code Detection ................................................................................................................................. 30
1.4.7. Automatic Installation of Firmware and Configuration .................................................................................... 30
1.4.8. Warm Reboot ................................................................................................................................................... 31