13.07.2015 Views

CISCO-Catalyst 6500 Expansion Module DS - CXtec

CISCO-Catalyst 6500 Expansion Module DS - CXtec

CISCO-Catalyst 6500 Expansion Module DS - CXtec

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Software FeaturesThe Cisco <strong>Catalyst</strong> OS Software Version 7.6(1) supports all software features previously supported by version 7.5(1)on the Cisco <strong>Catalyst</strong> <strong>6500</strong> and 4000/4500 series supervisor engines. In addition, version 7.6(1) supports thesoftware features listed in Table 2.Table 2 Software Features of Cisco <strong>Catalyst</strong> OS Software Version 7.6(1)Software FeatureDescriptionCisco<strong>Catalyst</strong><strong>6500</strong>SeriesFeatureCisco<strong>Catalyst</strong>4000SeriesFeatureTime DelayReflectometer (TDR)TDR can be used to check cable pairs for errors such as degradedspeed or higher packet loss, which can cause poor performanceof the cable. It can also detect whether the cable is open, short, orbroken. The length of the cable or the location of a problem canalso be detected. TDR is supported on the 48-port 10/100/1000BASE-T modules (and inline power versions) in this release.XPseudo Random BitSequence (PRBS) TestPRBS is a cable diagnostic test for existing 10-Gigabit Ethernetports on the Cisco <strong>Catalyst</strong> <strong>6500</strong> Series switches (currently onlythe WS-X6502-10GE).XIEEE 802.1x withDynamic HostConfiguration Protocol(DHCP)This standard allows port security to be configured on an802.1x-enabled port. If port security is enabled for only one MACaddress on a port, only that MAC address will authenticate via theRemote Authentication Dial-In User Service (RADIUS) server. Allother MAC addresses will be denied access to the network, whicheliminates the security risk of additional users attaching to a hubto bypass authentication. When 802.1x and port security areenabled in the multiple authentication mode, all hosts attemptingto connect through a switch port will be required to authenticateusing 802.1x.XLayer 2 TunnelingProtocol on trunkportsLayer 2 Tunneling Protocol makes control protocol data units suchas Spanning-Tree Protocol, Cisco Discovery Protocol, and VLANTrunking Protocol (VTP), transparent to the service provider whenpassing traffic through trunk ports. In earlier releases, Layer 2Tunneling Protocol was available only on access ports.XMultiple switch virtualinterfaces (SVIs) onfirewallSupport for multiple SVIs on the Cisco Firewall Services <strong>Module</strong>.Previously, only one SVI was supported.XAuto-save feature fortext-configurationmodeThe auto-save feature is a way of saving configuration to thenonvolatile random-access memory (NVRAM) intext-configuration mode automatically after a specified interval.The NVRAM file will be used for configuration during the nextbootup. Using the set config mode text auto-save enablecommand, the text configuration auto-save feature is enabledwith a default interval of 30 minutes.XSyslog dumpIf the system fails, a file containing the system messages in thesyslog buffer (as displayed when entering the show loggingbuffer command) is produced.XCisco Systems, Inc.All contents are Copyright © 1992–2003 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.Page 2 of 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!