Extreme Networks Summit X670 Series Manuel d'utilisateur Page 4

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 11
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 3
X670 G2 – Data Sheet 4
MPLS
On the Summit X670-G2 series switches MPLS can be enabled,
if needed, by way of an optional feature pack. MPLS provides
the ability to implement trac engineering and multi-service
networks, and improve network resiliency. The MPLS protocol
suite provides the ability to deploy services based on L2VPNS
(VPLS/VPWS), BGP-based L3VPNS; LSP Establishment based
on LDP, RSVP-TE, Static provisioning; Integrated OAM tools
like VCCV, BFD and CFM; And MPLS Fast Reroute to support
rapid local convergence around network failures.
High Availability Network Protocols
ETHERNET AUTOMATIC PROTECTION
SWITCHING (EAPS)
EAPS allows the IP network to provide the level of resiliency
and uptime that users expect from their traditional voice
network. EAPS is more adaptable than Spanning Tree or Rapid
Spanning Tree protocols and can achieve sub-second recovery
that delivers consistent failover regardless of the number
of VLANs, network nodes or network topology in Extreme
Networks-recommended configurations.. EAPS functionality
increases network recovery time, which results in significant
reduction in Voice-over IP call drop rates and improvement in
digital video performance in supported solution configurations.
SPANNING TREE/RAPID SPANNING TREE
PROTOCOLS
Summit X670-G2 supports Spanning Tree (802.1D), Per VLAN
Spanning Tree (PVST+), Rapid Spanning Tree (802.1w) and
Multiple Instances of Spanning Tree (802.1s) protocols for
Layer 2 resiliency.
SOFTWARE-ENHANCED AVAILABILITY
Software-enhanced availability allows users to remain
connected to the network even if part of the network
infrastructure is down. Summit X670-G2 continuously checks
for problems in the uplink connections using advanced
Layer 3 protocols such as OSPF, VRRP and Extreme Standby
Router Protocol (ESRP, supported in Layer 2 or Layer 3), and
dynamically routes trac around the problem.
EQUAL COST MULTIPATH
Equal Cost Multipath (ECMP) routing allows uplinks to be
load balanced for performance and cost savings while also
supporting redundant failover. If an uplink fails, trac is
automatically routed to the remaining uplinks and connectivity
is maintained.
LINK AGGREGATION (802.3AD)
Link aggregation allows trunking of up to 32 links on a
single logical connection, for up to 320 Gbps of redundant
bandwidth per logical connection.
MULTI-SWITCH LAG (M-LAG)
M-LAG can address bandwidth limitations and improve
network resiliency, in part by routing network trac around
bottlenecks, reducing the risks of a single point of failure, and
allowing load balancing across multiple switches.
HARDWARE REDUNDANCY
Summit X670-G2 series switches support a dual redundant
AC/DC power supply to provide high availability. The power
supply can be hot-swapped and replaced should it fail. Summit
X670-G2 also supports standardized N+1 redundant hot-
swappable fan units.
Robust IP and MAC Security
Framework
MEDIA ACCESS CONTROL (MAC) LOCKDOWN
MAC security allows the lockdown of a port to a given MAC
address and limiting the number of MAC addresses on a
port. This capability can be used to dedicate ports to specific
hosts or devices such as VoIP phones or printers and avoid
abuse of the port—a capability that can be especially useful
in environments such as hotels. In addition, an aging timer
can be configured for the MAC lockdown, protecting the
network from the eects of attacks using (often rapidly)
changing MAC addresses.
IP SECURITY
ExtremeXOS IP security framework helps protect the network
infrastructure, network services such as DHCP and DNS and
host computers from spoofing and man-in-the-middle attacks.
It also protects the network from statically configured and/or
spoofed IP addresses and builds an external trusted database
of MAC/ IP/port bindings providing the trac’s source from a
specific address for immediate defense.
IDENTITY MANAGEMENT
Identity Manager allows network managers to track users
who access their network. User identity is captured based
on NetLogin authentication, LLDP discovery and Kerberos
snooping. ExtremeXOS uses the information to then report on
the MAC, VLAN, computer hostname, and port location of the
user. Further, Identity Manager can create both roles and policies,
and then bind them together to create role-based profiles based
on organizational structure or other logical groupings, and
apply them across multiple users to allow appropriate access
to network resources. In addition, support for Wide Key ACLs
further improves security by going beyond the typical source/
destination and MAC address as identification criteria access
mechanism to provide filtering capabilities.
Vue de la page 3
1 2 3 4 5 6 7 8 9 10 11

Commentaires sur ces manuels

Pas de commentaire