Cisco 2960S-24TS-S Datasheet Page 6

  • Download
  • Add to my manuals
  • Print
  • Page
    / 16
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 5
Data Sheet
© 2010 - 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 16
Monitoring and troubleshooting capabilities that incorporate Cisco hardware best practices and diagnostics
features
Automation in managing hardware inventories, security vulnerabilities (PSIRTS) and platform end-of-life and
support cycles
For detailed information about CiscoWorks LMS, go to:
http://www.cisco.com/en/US/products/sw/cscowork/ps2425/index.html.
Borderless Security
The Cisco Catalyst 2960-S and 2960 LAN Lite Series Switches provide basic TrustSec, a primary element of
Borderless Security Architecture, that helps enterprise customers secure their networks, data and resources with
policy-based access control, identity-aware and role-aware networking, pervasive integrity, and confidentiality. The
borderless security is enabled by the following feature sets in the Cisco Catalyst 2960-S and 2960 Series Switches:
Basic Cisco TrustSec
Other security features
Cisco TrustSec
The Cisco TrustSec solution provides authentication, access control, and security policy administration to
secure network connectivity and resources. On the Cisco Catalyst 2960-S and 2960 Series with LAN Lite, the
TrustSec solution prevents unauthorized access and helps ensure that users get only their designated
privileges. It provides the ability to dynamically administer granular levels of network access.
Other Security Features
Other Advanced Security features include but are not limited to:
MAC Auth Bypass (MAB) for voice allows third-party IP phones without an 802.1X supplicant to get
authenticated using their MAC address.
Port Security can be used to limit access on an Ethernet port based on the MAC address of the device to
which it is connected. It also can be used to limit the total number of devices plugged into a switch port,
thereby protecting the switch from a MAC flooding attack as well as reducing the risks posed by rogue
wireless access points or hubs.
The MAC Address Notification feature can be used to monitor the network and track users by sending an
alert to a management station so that network administrators know when and where users enter the network
Secure Shell (SSH) Protocol v2 and SNMP v3 provide network security by encrypting administrator traffic
during Telnet and SNMP sessions. SSH v2 and the cryptographic version of SNMP v3 require a special
cryptographic software image because of U.S. export restrictions.
Borderless Experience
Borderless network enables enterprise mobility and business-grade video services. The industry’s first unified
network (wired and wireless) location services enable tracking of mobile assets and the users of those assets for
both wired and wireless devices. The true borderless experience is enabled by the following feature sets in the Cisco
Catalyst 2960-S and 2960 Series Switches:
Layer 2 networking
QoS
Page view 5
1 2 3 4 5 6 7 8 9 10 11 ... 15 16

Comments to this Manuals

No comments