国产探花免费观看_亚洲丰满少妇自慰呻吟_97日韩有码在线_资源在线日韩欧美_一区二区精品毛片,辰东完美世界有声小说,欢乐颂第一季,yy玄幻小说排行榜完本

首頁 > 學院 > 網絡通信 > 正文

Features of the Catalyst 3550 Ethernet Switch

2019-11-04 23:25:41
字體:
來源:轉載
供稿:網友

  a. Layer 3 / ip Unicast Routing
  i. RIP
  ii. IGRP / EIGRP
  iii. OSPF
  iv. BGP
  v. HSRP
  vi. Distance Vector Multicast Routing PRotocol (DVMRP) tunneling
  vii. Multicast Routing
  1. PIM
  2. IGMP
  3. MVR Multicast VLAN Registration Protocol
  b. Security
  i. Gaining access
  1. Multilevel security on console access (prevents unauth users
  from altering switch config)
  2. Securing Telnet Access to the Switch
  ii. SSH
  iii. 802.1x Authentication
  iv. RADIUS / TACACS+
  v. Router ACL’s
  vi. VLAN-Maps
  vii. When to Use Access-Lists and VLAN-Maps
  viii. Port-Based Security
  1. Port-Based ACLs (PACLs)
  2. Port-Based Traffic Control
  a. Storm Control
  b. Proteced Ports (Similar to Private VLAN)
  c. Port Blocking
  d. Port Security
  c. Quality of Service (QoS)
  i. Advanced QoS
  ii. Automatic QoS (Auto QoS)
  iii. Rate-limiting
  iv. Using Class-Maps
  v. Policy Maps
  vi. Classify, Police, and Mark Using Policy Maps.
  vii. Classify, Police, and Mark Traffic Using Aggregate Policers
  d. Layer 2 VLANS / Spanning Tree Protocol (STP): IEEE 802.1D
  2
  i. VTP
  ii. Voice VLAN
  iii. Standard-Range VLAN Configuration
  iv. Configuring Extended VLANs
  v. Spanning-tree root guard (STRG)
  vi. Loopguard
  vii. Uplinkfast
  viii. Backbone Fast Configuration
  ix. Portfast
  x. CrossStack UplinkFast (CSUF)
  xi. Per VLAN Spanning Tree Plus (PVST+)
  xii. ISL
  xiii. 802.1q
  xiv. RSTP - IEEE 802.1w Rapid Spanning Tree Protocol (RSTP)
  xv. MST – IEEE 802.1s Multiple Spanning Tree
  xvi. Fallback Bridging
  xvii. UniDirectional Link Detection (UDLD) and Aggressive UDLD
  e. EtherChannel
  f. Misc
  i. Switch Optimization
  ii. WCCP
  iii. SNMP
  iv. SPAN and RSPAN
  v. Multi-VRF CE (Virtual Routing Forwarding Customer Edge, also called
  VRF-lite)
  vi. DHCP Option 82 Subscriber Identification
  vii. Service Provider-Oriented Functions
  1. Layer 2 Protocol Tunneling
  viii. Clustering
  g. Links
  3. Appendix A – Command Reference3550 SSH
  Switch(config)# crypto key generate rsa 啟用SSH
  
  Switch(config)# username bob passWord dsb
  Switch(config)# line vty 0 4
  Switch(config)# login local
  authentication
  Switch(config)# transport input ssh 只使用SSH

發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
主站蜘蛛池模板: 盐亭县| 竹溪县| 乐平市| 广州市| 佛山市| 安龙县| 天长市| 秦安县| 绍兴县| 无棣县| 乳山市| 理塘县| 通州区| 历史| 达尔| 凤城市| 从江县| 宁津县| 阳高县| 贵定县| 海盐县| 墨玉县| 古蔺县| 永清县| 嵊州市| 闵行区| 盐边县| 本溪| 林州市| 论坛| 滨海县| 桓台县| 长乐市| 诸暨市| 东乡族自治县| 安庆市| 盐源县| 长兴县| 肇庆市| 吴旗县| 唐海县|