EasyManuals Logo
Home>Enterasys>Switch>Matrix N1

Enterasys Matrix N1 User Manual

Enterasys Matrix N1
12 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
Enabling Secure Networks
An integral part of the Secure Networks architecture from Enterasys,
the Matrix N-Series provides advanced security, priority and bandwidth
control mechanisms without compromising network performance. Secure
Networks leverages the distributed, flow-based visibility and advanced
policy-based control of the Matrix N-Series.
NetFlow Without Compromise
NetworkperformancemanagementandsecuritycapabilitiesviaNetFlow
areavailableoneveryMatrixN-SeriesDFEwithoutslowingdown
switching/routing performance or requiring the purchase of expensive
daughter cards for every blade. Enterasys tracks every packet in every
flow as opposed to competitor’s statistical sampling techniques.
The Matrix N-Series’ distributed, flow-based architecture allows for a
very granular level of visibility and control for each user and application
conversation, or flow, while simultaneously handling a large volume of
traffic. The distributed architecture enables each switch module in a
Matrix N-Series chassis to function independently of other modules and
eliminates single points of failure. Each chassis is managed as a single
systemusingasingleIPaddress.Thiscapabilityisuniqueintheindustry
and provides security and management automation.
Distributed Flow-Based Architecture
Inordertoensuregranularvisibilityandcontroloftrafcismaintained,
without sacrificing performance, the Matrix N-Series deploys a
distributed, flow-based architecture. This architecture ensures that when
a specific communications flow is being established between two end
points, the first packets in that communication are processed through
themultilayerclassicationengineintheswitch.Inthisprocess,the
role is identified, the applicable policies are determined, the frames are
inspected, and the action is determined. After the flow is identified, all
subsequent frames associated with that flow are automatically handled in
ASICswithoutanyfurtherprocessing.Ifthatowweretochangeinany
way, a new flow would be identified and new policies would be applied.
InthiswaytheMatrixN-Seriesisabletoapplyaverygranularlevelof
control to each flow without sacrificing performance.
Multi-User Authentication and Policy
Authenticationallowsenterpriseorganizationstocontrolnetworkaccess
andprovidesmobilitytousersanddevices.Itprovidesawaytoknowwho
or what is connected to the network and where this connection is at any
time. Matrix N-Series has unique, market leading capabilities regarding
thetypesofsimultaneousauthenticationmethods.DFEscansupport
multipleconcurrentauthenticationtechniques,including802.1X
authentication; MAC authentication, which is a way to authenticate
devicesonthenetworkusingtheMACaddress;andWeb-Based
authentication,alsoknownasPortWebAuthentication(PWA),wherea
user name and password are supplied through a browser. This capability
provides great flexibility to enterprises looking to implement access
control mechanisms across their infrastructure.
Distribution
Enables simplified user/device
identification within a
Secure Network™
User authenticated/access and
application control enforced here –
up to 1024 users per port
Edge
User physically
connected here
Features
Page 4

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Enterasys Matrix N1 and is the answer not in the manual?

Enterasys Matrix N1 Specifications

General IconGeneral
BrandEnterasys
ModelMatrix N1
CategorySwitch
LanguageEnglish

Related product manuals