Extreme Networks 15601 Fiche technique Page 2

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 4
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 1
Extreme Networks Data Sheet
© 2009 Extreme Networks, Inc. All rights reser ved. Summit48si—Page 2
Extreme Networks Data Sheet
Summit48si Customer Benefits
Quality of Service and
Application Flexibility
Maximum Performance
With industry-leading performance for
the most demanding applications,
Summit48si has a non-blocking architec-
ture with 17.5 gigabits of throughput with
wire-speed performance on every port.
Bidirectional rate shaping allows you to
manage bandwidth on Layer 2 and Layer 3
trafficowing both to and from the switch.
DiffServ and 802.1p deliver varied levels
of service for time-sensitive, demanding
applications for voice, video and data
and ensure efficient bandwidth usage.
Eight hardware queues provide granu-
larity for multiple applications, and
guarantee low latency/low jitter for time
sensitive applications (voice and
multimedia) with support for advanced
scheduling algorithms.
Application Flexibility
Summit48si features a 128K routing
table size for maximum forwarding
control at the edge with the same
advanced feature set supported end-to-
end throughout the customer’s network.
Protocol-based VLANs enable the network
administrators to define a packet filter
that the switch uses as the matching
criteria to determine if a particular
packet belongs to a particular VLAN.
Virtual MANs (vMANs) feature is useful
in building transparent private networks
that need point-to-point or point-to-
multipoint connectivity across an
Ethernet infrastructure.
Policy-Based QoS with 8 queues per
port, bidirectional rate shaping and
bandwidth management provides the
ability to prioritize mission-critical
applications and traffic to deliver
maximum productivity and deliver
delay-sensitive applications such as
voice and video.
High Network Availability
Redundant hot-swappable power
supplies, and fiber gigabit uplinks
provide true high availability as
Summit48si immediately is able to
failover to the redundant port and the
user’s application is unaffected. The user
stays connected to the network and
remains productive.
Summit48si delivers connectivity and
productivity with advanced high availabil-
ity features, such as EAPS (RFC 3619)
with multidomain support to deliver
subsecond (less than 50ms recovery)
protection switching to interconnected
switches in an Ethernet ring topology.
EAPS is similar to Spanning Tree Protocol
(STP), but offers the advantage of
converging in significantly less time than
STP or even Rapid Spanning Tree
(802.1w) when a link breaks in the ring.
ESRP can be implemented at both Layers
2 and 3 and extends the Virtual Redundant
Redundancy Protocols (VRRP) capabilities,
adding Layer 2 resiliency and loop prevention
and Layer 3 default router redundancy.
Equal Cost Multipath (ECMP) allows the
networks to be even more resilient as
multiple equal-cost routes can be used
concurrently to an end destination.
With the software redundant port feature,
a specified primary port can be backed up
by another port. Should the link go down
on the primary port, the redundant port
will establish link and become active. Thus
multihomed redundancy can be easily
designed without the complexity of
a protocol.
Comprehensive Security for
Control at the Edge of the
Network
With IEEE 802.1x Login, network managers
can always control who is connected to the
network and prevent unauthorized clients
from gaining access to the network.
Web-based Network Login does not
require any specific client software and
can work with any HTTP-compliant web
browser and thus is independent of
platform. Every user on every port can be
authenticated so the network is protected
at the most sensitive point of attack.
MAC address security allows identifying
port abuse such as rogue wireless access
points or hubs/switches on edge ports. It
includes two features: lockdown on a per
port basis and limiting the number of MAC
addresses learned by a port. Lockdown
and saving learned MAC addresses
between reboots can be used to protect
dedicated ports for VoIP phones or
printers from abuse. Limiting the number
of MAC addresses learned on a port also
allows enforcement of service level
agreements in tenant or service provider
environments.
SSHv2 allows network managers to
securely configure the box remotelywith-
out any risk of packet snooping or man-in-
the-middle attack. SSHv2, DoS protection,
TACACS+ and RADIUS bring reliable
secure configuration traffic (encryption)
and authentication.
Scanning of malicious users or virusinfect-
ed end-clients can cause the Forwarding
Database (FDB) table to fill up very
quickly and FDB replacements to happen
at higher rate. The attacks can hurt the
quality of internal traffic significantly, if all
Layer 3 forwarding is made by host lookup.
The IPDA SUBNET lookup feature forces
the attack traffic to use the IPFDB
SUBNET forwarding table instead of the
host-forwarding table. This feature is
intended to decrease frequency of FDB
collision and replacement and accelerate
packet forwarding for Summit48si.
Multiple Supplicant (client) enables
multiple clients to be individually authenti-
cated on the same port.
Summit48si has wire-speed Layers 2 – 4
ACLs on every port for maximum security
while maintaining maximum throughput.
Ease of Management
Extreme Networks has developed tools
that save you time and resources in
managing your network. EPICenter
®
provides all fault configuration, account-
ing, performance, and security functions
to manage Extreme Networks’ multi-layer
switching equipment in a converged
network. EPICenter Policy Manager
provides layer-independent policy
enforcement for Layers 1 – 4.
Extreme Networks’ software application,
ServiceWatch
®
, delivers powerful,
Layers 4 – 7 monitoring and management
for mission-critical network services.
Vue de la page 1
1 2 3 4

Commentaires sur ces manuels

Pas de commentaire