COMMANDO Soldier E2000 Series Switches are fully managed, PoE+ Gigabit Ethernet L2+ switch with network resiliency and high availability, delivering robust performance and intelligent switching for growing networks
Read MoreGeneral commands used in E2000 Series Switches are described in the Administration. The switch administration is to perform some basic switch administration tasks
Read MoreThe AAA feature allows you to verify the identity of, grant access to, and track the actions of users managing E2000 Series switches. The E2000 Series switches support Remote Access Dial-In User Service (RADIUS)
Read MoreAn ACL is a sequential collection of permit and deny conditions that apply to packets. Packet filtering can help limit network traffic and restrict network use by certain users or devices
Read MoreYou can control access to your network through Switch by using authentication methods such as 802.1X, MAC Based and Web Based. Authentication manager implementation that delegates responsibility
Read MoreE2000 Series Switches Diagnostics offer proactive diagnostics and real-time alerts and provides higher network availability and increased operational efficiency. Log files of a switch are classified into: user log files and diagnostic log files
Read MoreThe example shows how to set write-delay timer to 60 seconds. You can verify settings by the following show ip dhcp snooping database command
Read MoreA Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash
Read MoreA switch can use DAI (Dynamic ARP Inspection) to prevent certain types of attacks that leverage the use of IP ARP messages. DAI is a security feature that validates ARP packets in a network
Read MoreGARP VLAN Registration Protocol (GVRP) is a Generic Attribute Registration Protocol (GARP) application that provides 802.1Q-compliant VLAN pruning and dynamic VLAN creation on 802.1Q trunk ports
Read Morenone Show ip igmp router include dynamic and static and forbidden (dynamic | forbidden | static) Display Ip igmp router info for different type
Read MoreIP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database or manually configured IP source bindings
Read MoreLACP, a sub component of IEEE 802.3ad, provides additional functionality for link aggregation groups (LAGs). Use the link aggregation feature to aggregate one or more Ethernet interfaces to form a logical point-to-point link, known as a LAG, virtual link, or bundle
Read MoreAlmost all information technology systems generate a log, which serves as a record of all the activity that the system conducted in its operation. Such logs are generated by network infrastructure devices (firewalls, switches, domain name service devices, routers, load balancers)
Read MoreA MAC address table, sometimes called a Content Addressable Memory (CAM) table, is used on Ethernet switches to determine where to forward traffic on a LAN. Now let's break this down a little bit to understand how the MAC address table is built and used by an Ethernet switch to help traffic move along the path to its destination
Read MoreAn Access Control List (ACL) is a set of rules that is usually used to filter network traffic. ACLs can be configured on network devices with packet filtering compatibilities, such as routers and firewalls. ACLs contain a list of conditions that categorize packets and help you determine when to allow or deny network traffic
Read MoreUse the ipv6 mld max-groups command to limit port learning max group number. When the port has reach limitation, new group will not add this port. Static group is excluded. Use the “no” form of this command to restore to default. You can verify settings by the show ipv6 mld max-groups command
Read MoreThe switch comes with default port settings that should allow you to connect to the Ethernet Ports without any necessary configuration. Should there be a need to change the name of the ports, Port State, negotiation settings or flow control settings etc
Read MoreWhen a port is in error-disabled state, it is effectively shut down and no traffic is sent or received on that port. The ErrDisable feature is implemented to handle critical situations where the switch detected excessive or late collisions on a port
Read MorePort Security helps secure the network by preventing unknown devices from forwarding packets. When a link goes down, all dynamically locked addresses are freed. The port security feature offers the following benefits
Read MoreRate-limiting for all traffic operates on a per-port basis to allow only the specified bandwidth to be used for inbound or outbound traffic. When traffic exceeds the configured limit, it is dropped
Read More