Enterasys ANG-1000 Bedienungsanleitung Seite 4

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 12
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 3
Enabling Secure Networks
An integral part of the Secure Networks architecture from Enterasys,
the N-Series provides advanced security, priority, and bandwidth control
mechanisms without compromising network performance. Secure
Networks leverages the distributed, flow-based visibility and advanced
policy-based control of the N-Series.
NetFlow Without Compromise
NetworkperformancemanagementandsecuritycapabilitiesviaNetFlow
areavailableoneveryN-SeriesDFEwithoutslowingdownswitching/
routingperformanceorrequiringthepurchaseofexpensivedaughter
cards for every blade. Enterasys tracks every packet in everyow as
opposed to competitors statistical sampling techniques.
The N-Series’ distributed, flow-based architecture allows for a very
granular level of visibility and control for each user and application
conversation, or flow, while simultaneously handling a large volume
of traffic. The distributed architecture enables each switch module in
a N-Series chassis to function independently of other modules and
eliminates single points of failure. Each chassis is managed as a single
systemusingasingleIPaddress.Thiscapabilityisuniqueintheindustry
and provides security and management automation.
Distributed, Flow-Based Architecture
Inordertoensurethatgranularvisibilityandcontroloftrafcis
maintained, without sacrificing performance, the N-Series deploys a
distributed, flow-based architecture. This architecture ensures that when
a specific communications flow is being established between two end
points, therst packets in that communication are processed through
themulti-layerclassicationengineintheswitch.Inthisprocess,the
role is identified, the applicable policies are determined, the frames are
inspected, and the action is determined. After theow is identified, all
subsequent frames associated with thatow are automatically handled in
ASICswithoutanyfurtherprocessing.Ifthatowweretochangeinany
way, a new flow would be identified and new policies would be applied.
InthiswaytheN-Seriesisabletoapplyaverygranularlevelofcontrolto
eachow without sacrificing performance.
Multi-User Authentication and Policy
Authenticationallowsenterpriseorganizationstocontrolnetworkaccess
andprovidesmobilitytousersanddevices.Itprovidesawaytoknow
who or what is connected to the network and where this connection is at
any time. The N-Series has unique, market-leading capabilities regarding
thetypesofsimultaneousauthenticationmethods.DFEscansupport
multipleconcurrentauthenticationtechniques,including802.1X
authentication;MACauthentication,whichisawaytoauthenticate
devicesonthenetworkusingtheMACaddress;andWeb-Based
authentication,alsoknownasPortWebAuthentication(PWA),wherea
user name and password are supplied through a browser. This capability
providesgreatexibilitytoenterpriseslookingtoimplementaccess
control mechanisms across their infrastructure.
Distribution
Enables simplified user/device
identification within a
Secure Network™
User authenticated/access and
application control enforced here –
up to 1024 users per port
Edge
User physically
connected here
Features
Page 4
Seitenansicht 3
1 2 3 4 5 6 7 8 9 10 11 12

Kommentare zu diesen Handbüchern

Keine Kommentare