EasyManua.ls Logo

Enterasys Matrix N1 - Standards and Protocols; Class of Service

Enterasys Matrix N1
12 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
as well as firewall-like security on every port for downstream devices
throughmulti-user,multimethodauthentication,authorizationandaudit.
Enterasys N-series flow switches:
• Ensureonlytherightusersareaccessingtherightinformationfrom
the right place at the right time
• Discover,classifyandprioritizevoiceandvideotrafcdistinctlyfrom
datatrafceventhoughasingleportmayhave1,000downstream
users
Matrix N-series can also be positioned at the edge of the network
enablinguser/devicelevelconnectivity.Highdensity10/100/1000
connectivity and network access control functionality prevents the
spread of worms or viruses throughout a network, protecting users within
aVLANorworkgroupthroughquarantineandisolationofindividual
conversations.AdditionallystandardsbasedPoEsupportforIPtelephony
services and applications ensure support for convergence applications.
Switching / VLAN Services
•802.1QVLANs
•802.1DMACBridges
•802.1wRapid-reconvergenceofSpanningTree
•802.1sMultipleSpanningTree
•802.3adLinkAggregation
•802.3aeGigabitEthernet
•802.3az10-GigabitEthernet
•802.3xFlowControl
•IPMulticast(IGMPsupportv1,v2,perVLANquerierofoad)
•JumboPacketwithMTUDiscoverySupportforGigabit
•LinkFlapDetection
•DynamicEgress(AutomatedVLANPortConguration)
•GenericVLANRegistrationProtocol(GVRP)
IP Routing
•RFC1812GeneralRouting
•RFC792ICMP
•RFC1256ICMPRouterDiscoveryProtocol
•RFC826ARP
•RFC1027ProxyARP
•StaticRoutes
•RFC1058RIPv1
•RFC1723RIPv2withEqualCostMultipathLoadBalancing
•RFC1812RIPRequirements
•RFC1519CIDR
•RFC2338VirtualRouterRedundancyProtocol(VRRP)
•StandardACLs
•DHCPServerRFC1541/RelayRFC2131
Extended IP Routing
•RFC1583/RFC2328OSPFv2
•RFC1587OSPFv2NSSA
•RFC1745OSPFInteractions
•RFC1746OSPFInteractions
•RFC1765OSPFDatabaseOverow
•RFC2154OSPFwithDigitalSignatures(Password&MD5)
•OSPFwithMultipathSupport
•OSPFPassiveInterfaces
•RFC2391LoadSharingusingNetworkAddressTranslation
•ExtendedACLs
•PolicyBasedRouting
•RFC1112IGMP
•RFC2236IGMPv2
•DVMRPv3-10
•RFC2361ProtocolIndependentMulticast-SparseMode
Network Security and Policy Management
•802.1Xportbasedauthentication
•Webbasedauthentication(PWA+)
•MACbasedauthentication
•ConvergenceEndpointDiscoverywithDynamicPolicyMapping
(SiemensHFA,CiscoVoIP,H.323andSIP,LLDP-MED)
•Multipleauthenticationtypesperportsimultaneously(802.1x,
MAC,PWA+)
•MultipleauthenticatedUsersperportwithUniquePoliciesperUser/
endsystem(VLANassociationindependent)
•RFC3580IEEE802.1RadiusUsageGuidelines,withVLANtoPolicy
Mapping&VLANassignmentviaauthentication.
•WormSuppression(FlowSet-UpThrottling)
•BroadcastSuppression
•ARPStormPrevention
•MACtoPortLocking
•SpanGuard(SpanningTreeProtection)
•StatefulIntrusionDetectionSystemLoadBalancing
•StatefulIntrusionPreventionSystemandFirewallLoadBalancing
•BehavioralAnomalyDetection/FlowCollector(non-sampledNetow
version5andversion9)
•StaticMulticastGroupProvisioning
•MulticastGroup,SenderandReceiverPolicyControl
•VLANTAGOverwrite
Class of Service
•StrictPriorityQueuing
•WeightedFairQueuingwithQueueBandwidthshaping
•4/16TransmitQueuesperport(1000BaseXSFP)
•4TransmitQueuesperport(10/100/1000)
•16TransmitQueuesperport(10-GigabitEthernet)
•Upto1024RateLimiters
•PacketcountorBandwidthbasedRateLimiters.
•IPToS/DSCPMarking/Remarking
•802.1DPrioritytoTransmitQueueMapping
Standards and Protocols
Page 8

Related product manuals