Enterasys B2G124-24 Fiche technique Page 2

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 9
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 1
Extensive Traffic Classification
SecureStack B2 switches comprise the ideal family of switches for
delivering any converged network solution. A major component for
supporting converged networks is traffic classification. All SecureStack
B2 switches deliver extensive Layer 2/3/4 packet classification and
marking at the edge based on any of the following attributes:
• MACaddress
• Physicalport
• IPaddress
• IPProtocol
• IPToS/DSCPmarking
• TCP/UDPport
• IPsubnet
With the optional Secure Networks Policy License, these classifications
can then be used to deny or permit access, or prioritize traffic.
Advanced Quality of Service
Broad support for Quality of Service makes SecureStack B2 switches an
ideal choice for all types of networks, including Voice over IP, real-time
and non-real-time video, and data-intensive applications. Extensive
classification capabilities combined with eight priority queues per port
allow the SecureStack B2 to granularly rate limit traffic flows. Weighted
round robin queuing is supported. Support for the IP Differentiated
Services Code Point (DSCP) enables the switches to enforce requested
service levels.
VLAN Support
All SecureStack B2 switches have VLAN support, with 4,096 VLAN IDs
supported and up to 1,024 VLANs active simultaneously in a single
stack. Receive port identification may be used to assign a user to a
specific VLAN. All switches support IEEE 802.1Q tagged and port-based
VLANs with full support for the GARP and GVRP protocols.
Extensive Security
Security is vital to all networks today and with SecureStack B2 switches
the network is protected at the first point of entry (user access). All
SecureStack B2 switches support user-access authentication with
IEEE 802.1x and MAC address. The SecureStack B2 also supports
per-port multi-user authentication with its implementation of PC +
Phone (user and IP phone). With PC + Phone the SecureStack B2 can
support MAC authentication on an IP phone along with simultaneous
user authentication via 802.1x or MAC address per port. In addition,
all SecureStack B2 switches support VLANs and RADIUS. Strong
authentication and encryption for the switch is provided via Secured
Shell (SSH) and RADIUS.
Dynamic VLAN Assignment Support
Support for RFC3580 Dynamic VLAN Assignment is included in
the basic SecureStack B2 firmware, which enables an end user
to automatically be mapped to the appropriate VLAN upon being
authenticated via IEEE 802.1x.
Optional Secure Networks Support
Secure Networks is Enterasysunique approach to enterprise networking
that integrates advanced security and management features to centralize
and automate granular control of the entire network infrastructure.
All SecureStack B2 switches can become full members of a Secure
Networks solution with an optional policy license. The policy license
upgrade software has full support for static or port-based policies, and
dynamic policies specific to a user (per port based on IEEE 802.1x
authentication or MAC address, allowing up to one PC and one VoIP
Phone per port). Secure Networks features enable SecureStack B2
switches to fully participate in Secure Networks Acceptable Use Policy
(AUP), Dynamic Intrusion Response (DIR), and Trusted End-System
(TES) solutions.
Robust Switch and Stack Management
All SecureStack B2 switches are fully manageable using an industry-
standard command line interface, embedded web interface, Telnet with
SSH, and SNMP management applications such as NetSight Console or
NetSight Inventory Manager. Every SecureStack B2 switch supports four
groups of RMON (History, Statistics, Alarms, Events) and SNMP v1/2
and v3. Configuration files can be edited with any ASCII editor and can
be uploaded and downloaded from a switch. A SecureStack B2 stack
can be managed as a single network entity and only a single IP address
is required to manage the complete stack. There is no need to download
software images to individual stack units; only one software upgrade
needs to be performed per stack. The image will be distributed to the
individual stack members automatically. Port-mirroring (one-to-one and
many-to-one) is supported on individual switches as well as stack-wide,
enabling network managers to easily monitor and troubleshoot any port in
the stack.
Secure Networks Support
Each port on a policy-enabled SecureStack B2 can support as many as
100 rules and 10 masks. The maximum number of unique rules in a
single switch (or stack) is 100, while the maximum number of unique
masks is 18. These unique rules and masks may be shared across any
and all ports in a stack or switch.
Vue de la page 1
1 2 3 4 5 6 7 8 9

Commentaires sur ces manuels

Pas de commentaire