EasyManua.ls Logo

Quanta Cloud Technology QuantaMesh QNOS5

Quanta Cloud Technology QuantaMesh QNOS5
256 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4
1.1.33. Flooding to mRouter Ports ................................................................................................................................ 24
1.1.34. IGMP Snooping Querier .................................................................................................................................... 24
1.1.35. Management and Control Plane ACLs .............................................................................................................. 25
1.1.36. Remote Switched Port Analyzer (RSPAN) ......................................................................................................... 25
1.1.37. Link Dependency ............................................................................................................................................... 25
1.1.38. IPv6 Router Advertisement Guard .................................................................................................................... 25
1.1.39. FIP Snooping ..................................................................................................................................................... 26
1.1.40. ECN Support ...................................................................................................................................................... 26
1.2. Security Features ................................................................................................................... 26
1.2.1. Configurable Access and Authentication Profiles ............................................................................................. 26
1.2.2. AAA Command Authorization ........................................................................................................................... 27
1.2.3. Password-protected Management Access ....................................................................................................... 27
1.2.4. Strong Password Enforcement ......................................................................................................................... 27
1.2.5. MAC-based Port Security .................................................................................................................................. 27
1.2.6. RADIUS Client.................................................................................................................................................... 27
1.2.7. TACACS+ Client ................................................................................................................................................. 27
1.2.8. Dot1x Authentication (IEEE 802.1X) ................................................................................................................. 27
1.2.9. MAC Authentication Bypass ............................................................................................................................. 28
1.2.10. DHCP Snooping ................................................................................................................................................. 28
1.2.11. Dynamic ARP Inspection ................................................................................................................................... 28
1.2.12. IP Source Address Guard ................................................................................................................................... 28
1.2.13. Service Prohibit Access ..................................................................................................................................... 28
1.3. Quality of Service Features .................................................................................................... 28
1.3.1. Access Control Lists (ACL) ................................................................................................................................. 29
1.3.2. ACL Remarks ..................................................................................................................................................... 29
1.3.3. ACL Rule Priority ............................................................................................................................................... 29
1.3.4. Differentiated Service (DIffServ) ....................................................................................................................... 29
1.3.5. Class of Service (CoS) ........................................................................................................................................ 29
1.4. Management Features ........................................................................................................... 29
1.4.1. Management Options ....................................................................................................................................... 29
1.4.2. Management of Basic Network Information .................................................................................................... 30
1.4.3. Dual Software Images ...................................................................................................................................... 30
1.4.4. File Management.............................................................................................................................................. 30
1.4.5. FTP File Management ....................................................................................................................................... 30
1.4.6. Malicious Code Detection ................................................................................................................................. 30
1.4.7. Automatic Installation of Firmware and Configuration .................................................................................... 30
1.4.8. Warm Reboot ................................................................................................................................................... 31

Table of Contents