Virtual Switch Features

Add Layer 2 Tunnel Connection as a Virtual Port

“Add Layer 2 Tunnel Connection as a Virtual Port” refers to a feature used in network virtualization and tunneling protocols, typically involving Layer 2 (Data Link Layer) tunneling configurations. This operation allows the Layer 2 tunnel connection to be associated with a specific virtual port.

IPsec Encryption for Layer 2 Tunnels

IPsec Encryption for Layer 2 Tunnels is a method used to securely transmit Layer 2 data traffic that must pass over physical networks. This encryption, especially for Ethernet frames, ensures a secure connection using the IPsec (Internet Protocol Security) protocol. It is commonly used in multi-layered networks, remote connections, and data center interconnections. IPsec encryption enhances the security of tunnel connections and provides strong protection against external threats.

Add Physical Port as Member

Adding a Physical Port as a Member refers to including physical network ports into a specific logical network structure (e.g., VLAN, virtual network, etc.) in network configurations, especially in virtualization and network management systems. This process allows network administrators to associate physical ports with virtual networks, enabling more flexible and controlled traffic routing and management.

IEEE 802.1Q VLAN Untagged Port Assignment for Both Virtual and Physical Ports

An Untagged port is one that carries traffic not associated with a VLAN, meaning traffic without a VLAN tag. This port is typically assigned to only one VLAN and does not accept tagged traffic. It is usually used as an access port and communicates with devices in a single VLAN.

IEEE 802.1Q VLAN Tagged Port Assignment for Both Virtual and Physical Ports

A Tagged port carries traffic that belongs to one or more VLANs with tags (802.1Q tags). This port accepts data with VLAN tags and can carry traffic from multiple VLANs. It is commonly used as a trunk port to carry traffic from multiple VLANs.

IEEE 802.1Q VLAN Hybrid Port Assignment for Both Virtual and Physical Ports

A Hybrid port is capable of carrying both Tagged and Untagged traffic. This port can simultaneously transport both tagged (Tagged) and untagged (Untagged) data, functioning as both a trunk port and an access port. It works compatibly with both virtual networks and physical devices.

VLAN-Supported MAC Table

The VLAN-Supported MAC Table is a table where a network device (typically a switch) stores MAC addresses associated with VLANs and makes forwarding decisions based on this information. This table allows the correct routing of MAC addresses across VLANs using the IEEE 802.1Q VLAN tagging protocol.

IEEE 802.3ad Link Aggregation Control Protocol (LACP) combines multiple physical connections into a single logical link, enhancing network performance. This protocol is used for increasing bandwidth, load balancing, and ensuring redundancy. LACP automatically combines and directs connections, improving network efficiency and providing reliable, flexible network structures for administrators.

Spanning Tree Protocol

Spanning Tree Protocol (STP) is a protocol used to prevent network loops. It allows data transmission through only one path in a network with multiple routes, blocking redundant paths. This prevents data packets from looping infinitely and provides alternative routes in case of connection failures.

Rapid Spanning Tree Protocol (RSTP)

Rapid Spanning Tree Protocol (RSTP) is a faster version of Spanning Tree Protocol (STP). RSTP responds more quickly to changes in network topology, reducing connection downtime and transition delays. It is more efficient and faster than STP, ensuring faster network recovery and reliable path management.

Link Layer Discovery Protocol (LLDP) is a protocol used for sharing connection information between devices in a network. LLDP allows devices to communicate directly and share details like port, device name, software version, etc. This protocol helps in discovering network topology and tracking connections between devices in the network.

NetFlow Export Service

The NetFlow Export Service collects information about network traffic and exports NetFlow data from one device to another. These data are used for monitoring network performance, conducting analysis, and detecting security threats.

MAC Learning

MAC Learning is the process by which a network device (typically a switch) learns MAC addresses. The switch analyzes incoming data frames and stores these addresses in a MAC address table. This allows the device to know which device is located at which port, facilitating efficient data forwarding and speeding up network operations.

ePati Cyber Security Co.

Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY

Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39