
Examples of additional functionality and features that are supported by
the Enterasys K-Series:
s .ET&LOW 0ROVIDES REALTIME VISIBILITY APPLICATION PROlLING AND
capacity planning
s ,,$0-%$ ,INK ,AYER $ISCOVERY 0ROTOCOL FOR -EDIA %NDPOINT
Devices enhances VoIP deployments
s &LOW 3ETUP 4HROTTLING &34 EFFECTIVELY PREEMPTS AND DEFENDS
against DoS attacks
s .ODE !LIAS ,OCATION !UTOMATICALLY TRACKS USER AND DEVICE LOCATION
and enhances network management productivity and fault isolation
s 0ORT 0ROTECTION 3UITE -AINTAIN NETWORK AVAILABILITY BY ENSURING GOOD
protocol and end station behavior
s &LEX%DGE 4ECHNOLOGY 0ROVIDES ADVANCED BANDWIDTH MANAGEMENT
and allocation for demanding access/edge devices
Flow Setup Throttling (FST) is a proactive feature designed to mitigate
zero-day threats and Denial of Service (DoS) attacks before they can
affect the network. FST directly combats the effects of zero-day and
DoS attacks by limiting the number of new or established flows that
can be programmed on any individual switch port. This is achieved by
monitoring the new flow arrival rate and/or controlling the maximum
number of allowable flows.
In network operations, it is very time consuming to locate a device or
find exactly where a user is connected. This is especially important when
reacting to security breaches. Enterasys K-Series modules automatically
track the network’s user/device location information by listening to
network traffic as it passes through the switch. This information is then
used to populate the Node/Alias table with information such as an
ENDSTATIONS -!# ADDRESS AND ,AYER ALIAS INFORMATION )0 ADDRESS
)08 ADDRESS ETC 4HIS INFORMATION CAN THEN BE UTILIZED BY %NTERASYS
.-3 3UITE MANAGEMENT TOOLS TO QUICKLY DETERMINE THE SWITCH AND PORT
number for any IP address and take action against that device in the
event of a security breach. This node and alias functionality is unique
to Enterasys and reduces the time to pinpoint the exact location of a
problem from hours to minutes.
For organizations looking to deploy Unified Communications, the
Enterasys K-Series combines policy-based automation with support for
MULTIPLE STANDARDSBASED DISCOVERY METHODS INCLUDING ,,$0-%$ 3)0
AND ( TO AUTOMATICALLY IDENTIFY AND PROVISION 5# SERVICES FOR )0
phones from all major vendors. K-Series switches also provide dynamic
mobility for IP clients; when an IP phone moves and plugs in elsewhere
in the enterprise network, its VoIP service provisioning, security and
traffic priority settings move with it, with none of the typical manual
administration required for moves, adds and changes.
The K-Series also supports a comprehensive portfolio of port protection
CAPABILITIES SUCH AS 30!.GUARD AND -!#,OCK WHICH PROVIDE THE
ABILITY TO DETECT UNAUTHORIZED BRIDGES IN THE NETWORK AND RESTRICT A -!#
ADDRESS TO A SPECIlC PORT /THER PORT PROTECTION FEATURES INCLUDE ,INK
Flap, Broadcast Suppression and Spanning Tree Loop protection which
protects against mis-configuration and protocol failure.
Enterasys K-Series Flex-Edge technology provides line rate traffic
classification for all access ports with guaranteed priority delivery for
control plane traffic and high-priority traffic as defined by the Enterasys
policy overlay. In addition to allocating resources for important network
traffic, prioritized bandwidth can be assigned on a per port or per
authenticated user basis. Flex-Edge technology is ideal for deployment in
wiring closets and distribution points that can often suffer from spikes in
UTILIZATION THAT CAUSE NETWORK CONGESTION 7ITH &LEX%DGE TECHNOLOGIES
organizations no longer have to fear a momentary network congestion
event that would result in topology changes and random packet discards.
&EATURE2ICH &UNCTIONALITY
Page 4
Kommentare zu diesen Handbüchern