Enterasys 802 Manual de usuario Pagina 2

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 11
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 1
are identified and roles are applied to ensure each individual user can
access their business-critical applications no matter where they connect
to the network. K-Series policy rules combined with deep packet
inspection can intelligently sense and automatically respond to security
threats while improving reliability and quality of the user experience.
A significant differentiator for the K-Series is the ability to collect
NetFlow data at wire-speed providing total visibility into network resource
consumption for users and applications. The K-Series joins the S-Series
as the only enterprise switches to support multi-user, multimethod
authentication on every port — absolutely essential when you have
devices such as IP phones, computers, printers, copiers, security cameras,
badge readers, and virtual machines connected to the network.
These new modular switches deliver flexible connectivity, premium
features and integrated security that enable the network to quickly adapt
to changing business requirements.
Hardware-Based High Availability Features
The K-Series includes many standard high availability features. These
hardware-based high availability features allow the K-Series to be
deployed in mission critical environments that require 24/7 availability.
The K-Series supports the following hardware-based high availability
features:
• Passive chassis backplane
• Hot swappable fan trays with multiple cooling fans
• Hot swappable and load-sharing power supplies
• Multiple AC input connections for power circuit redundancy
• Up to 36 groups of eight Ethernet ports can be grouped together to
create a multi-link aggregation group (LAG)
Flow-Based Architecture
In order to ensure granular visibility and management of traffic
without sacrificing performance, the Enterasys K-Series deploys a
flowbased architecture. This architecture ensures that when a specific
communications flow is being established between two end points, the
first packets in that communication are processed through the multilayer
classification engines in the switch and the I/O fabric module. In this
process, the role is identified, the applicable policies are determined,
the packets are inspected and the action is determined. After the
flow is identified, all subsequent packets associated with that flow
are automatically handled in the Enterasys ASICs without any further
processing. In this way the Enterasys K-Series is able to apply a very
granular level of control to each flow at full line rate.
Multi-User/Method Authentication and Policy
Authentication allows enterprise organizations to manage network access
and provide mobility to users and devices. It provides a way to know who
or what is connected to the network and where this connection is at any
time. The Enterasys K-Series has unique, industry leading capabilities
regarding types of simultaneous authentication methods. K-Series modules
can support multiple concurrent authentication techniques, including:
• 802.1X authentication
• MAC authentication, which is a way to authenticate devices on the
network using the MAC address
• Web-based authentication, also known as Port Web Authentication
(PWA), where a user name and password are supplied through
a browser
• CEP, also known as Convergence End Point, where multiple vendors
VoIP phones are identified and authenticated; this capability provides
great flexibility to enterprises looking to implement access control
mechanisms across their infrastructure
A significant additional feature of the K-Series is the capability to
support multi-user authentication. This allows multiple users and
devices to be connected to the same physical port and each user or
device to be authenticated individually using one of the multi-method
options (802.1x, MAC, PWA, or CEP). The major benefit of multi-user
authentication is to authorize multiple users, either using dynamic policy
or VLAN assignment for each authenticated user. In the case of dynamic
policy, this is called Multi-User Policy. Multi-user port capacities with the
K-Series are determined on a per port, per I/O module, and per multi-slot
system basis.
Multi-user authentication and policy can provide significant benefits
to customers by extending security services to users connected to
unmanaged devices, third party switches/routers, VPN concentrators,
or wireless LAN access points at the edge of their network. Using
authentication provides security, priority, and bandwidth control while
protecting existing network investments. The K-Series supports up to 8
users per port with a license option for 256 users per port. Total system
capacity supports 1152 users on the K6 and 1920 users on the K10.
Dynamic, Flow-Based Packet Classification
Another unique feature that separates the Enterasys K-Series from all
competitive switches is the capability to provide User-Based Multi-layer
Packet Classification/QoS. With the wide array of network applications
used on networks today, traditional Multi-layer Packet Classification
by itself is not enough to guarantee the timely transport of business
critical applications. In the K-Series, User-Based Multi-layer Packet
Classification allows traffic classification not just by packet type, but also
by the role of the user on the network and the assigned policy of that
user. With User-Based Multi-layer Packet Classification, packets can be
classified based on unique identifiers like “All Users”, “User Groups”,
and “Individual User”, thus ensuring a more granular approach to
managing and maintaining network confidentiality, integrity,
and availability.
Network Visibility From High Fidelity NetFlow
Network performance management and security capabilities via NetFlow
are available on Enterasys K-Series switch ports without slowing down
switching and routing performance or requiring the purchase of expensive
daughter cards for every module. Enterasys NetFlow tracks every packet
Page 2
Vista de pagina 1
1 2 3 4 5 6 7 ... 10 11

Comentarios a estos manuales

Sin comentarios