Enterasys Matrix N7 7C107 Uživatelský manuál Strana 4

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 12
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 3
Enabling Secure Networks
An integral part of the Secure Networks architecture from Enterasys,
the Matrix N-Series provides advanced security, priority and bandwidth
control mechanisms without compromising network performance. Secure
Networks leverages the distributed, flow-based visibility and advanced
policy-based control of the Matrix N-Series.
NetFlow Without Compromise
NetworkperformancemanagementandsecuritycapabilitiesviaNetFlow
areavailableoneveryMatrixN-SeriesDFEwithoutslowingdown
switching/routing performance or requiring the purchase of expensive
daughter cards for every blade. Enterasys tracks every packet in every
flow as opposed to competitor’s statistical sampling techniques.
The Matrix N-Series’ distributed, flow-based architecture allows for a
very granular level of visibility and control for each user and application
conversation, or flow, while simultaneously handling a large volume of
traffic. The distributed architecture enables each switch module in a
Matrix N-Series chassis to function independently of other modules and
eliminates single points of failure. Each chassis is managed as a single
systemusingasingleIPaddress.Thiscapabilityisuniqueintheindustry
and provides security and management automation.
Distributed Flow-Based Architecture
Inordertoensuregranularvisibilityandcontroloftrafcismaintained,
without sacrificing performance, the Matrix N-Series deploys a
distributed, flow-based architecture. This architecture ensures that when
a specific communications flow is being established between two end
points, the first packets in that communication are processed through
themultilayerclassicationengineintheswitch.Inthisprocess,the
role is identified, the applicable policies are determined, the frames are
inspected, and the action is determined. After the flow is identified, all
subsequent frames associated with that flow are automatically handled in
ASICswithoutanyfurtherprocessing.Ifthatowweretochangeinany
way, a new flow would be identified and new policies would be applied.
InthiswaytheMatrixN-Seriesisabletoapplyaverygranularlevelof
control to each flow without sacrificing performance.
Multi-User Authentication and Policy
Authenticationallowsenterpriseorganizationstocontrolnetworkaccess
andprovidesmobilitytousersanddevices.Itprovidesawaytoknowwho
or what is connected to the network and where this connection is at any
time. Matrix N-Series has unique, market leading capabilities regarding
thetypesofsimultaneousauthenticationmethods.DFEscansupport
multipleconcurrentauthenticationtechniques,including802.1X
authentication; MAC authentication, which is a way to authenticate
devicesonthenetworkusingtheMACaddress;andWeb-Based
authentication,alsoknownasPortWebAuthentication(PWA),wherea
user name and password are supplied through a browser. This capability
provides great flexibility to enterprises looking to implement access
control mechanisms across their infrastructure.
Distribution
Enables simplified user/device
identification within a
Secure Network™
User authenticated/access and
application control enforced here –
up to 1024 users per port
Edge
User physically
connected here
Features
Page 4
Zobrazit stránku 3
1 2 3 4 5 6 7 8 9 10 11 12

Komentáře k této Příručce

Žádné komentáře