EasyManuals Logo

Quanta Cloud Technology QuantaMesh QNOS5 User Manual

Quanta Cloud Technology QuantaMesh QNOS5
256 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
4
1.1.33. Flooding to mRouter Ports ................................................................................................................................ 24
1.1.34. IGMP Snooping Querier .................................................................................................................................... 24
1.1.35. Management and Control Plane ACLs .............................................................................................................. 25
1.1.36. Remote Switched Port Analyzer (RSPAN) ......................................................................................................... 25
1.1.37. Link Dependency ............................................................................................................................................... 25
1.1.38. IPv6 Router Advertisement Guard .................................................................................................................... 25
1.1.39. FIP Snooping ..................................................................................................................................................... 26
1.1.40. ECN Support ...................................................................................................................................................... 26
1.2. Security Features ................................................................................................................... 26
1.2.1. Configurable Access and Authentication Profiles ............................................................................................. 26
1.2.2. AAA Command Authorization ........................................................................................................................... 27
1.2.3. Password-protected Management Access ....................................................................................................... 27
1.2.4. Strong Password Enforcement ......................................................................................................................... 27
1.2.5. MAC-based Port Security .................................................................................................................................. 27
1.2.6. RADIUS Client.................................................................................................................................................... 27
1.2.7. TACACS+ Client ................................................................................................................................................. 27
1.2.8. Dot1x Authentication (IEEE 802.1X) ................................................................................................................. 27
1.2.9. MAC Authentication Bypass ............................................................................................................................. 28
1.2.10. DHCP Snooping ................................................................................................................................................. 28
1.2.11. Dynamic ARP Inspection ................................................................................................................................... 28
1.2.12. IP Source Address Guard ................................................................................................................................... 28
1.2.13. Service Prohibit Access ..................................................................................................................................... 28
1.3. Quality of Service Features .................................................................................................... 28
1.3.1. Access Control Lists (ACL) ................................................................................................................................. 29
1.3.2. ACL Remarks ..................................................................................................................................................... 29
1.3.3. ACL Rule Priority ............................................................................................................................................... 29
1.3.4. Differentiated Service (DIffServ) ....................................................................................................................... 29
1.3.5. Class of Service (CoS) ........................................................................................................................................ 29
1.4. Management Features ........................................................................................................... 29
1.4.1. Management Options ....................................................................................................................................... 29
1.4.2. Management of Basic Network Information .................................................................................................... 30
1.4.3. Dual Software Images ...................................................................................................................................... 30
1.4.4. File Management.............................................................................................................................................. 30
1.4.5. FTP File Management ....................................................................................................................................... 30
1.4.6. Malicious Code Detection ................................................................................................................................. 30
1.4.7. Automatic Installation of Firmware and Configuration .................................................................................... 30
1.4.8. Warm Reboot ................................................................................................................................................... 31

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Quanta Cloud Technology QuantaMesh QNOS5 and is the answer not in the manual?

Quanta Cloud Technology QuantaMesh QNOS5 Specifications

General IconGeneral
BrandQuanta Cloud Technology
ModelQuantaMesh QNOS5
CategoryNetwork Router
LanguageEnglish