Extreme Networks 17201 Datasheet Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 10
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
4
Extreme Networks Data Sheet: Summit X670-48t
Technical Specifications
Loadable Software Modules
The modular design of the ExtremeXOS OS allows the upgrading of
individual software modules, should this be necessary, leading to higher
availability in the network.
Spanning Tree/Rapid Spanning Tree Protocols
Summit X670 supports Spanning Tree (802.1D), Per VLAN Spanning Tree
(PVST+), Rapid Spanning Tree (802.1w) and Multiple Instances of Spanning
Tree (802.1s) protocols for Layer 2 resiliency.
Software-Enhanced Availability
Software-enhanced availability allows users to remain connected to the
network even if part of the network infrastructure is down. Summit X670
continuously checks for problems in the uplink connections using advanced
Layer 3 protocols such as OSPF, VRRP and Extreme Standby Router
Protocol™ (ESRP, supported in Layer 2 or Layer 3), and dynamically routes
trac around the problem.
Equal Cost Multipath
Equal Cost Multipath (ECMP) routing allows uplinks to be load balanced for
performance and cost savings while also supporting redundant failover. If
an uplink fails, trac is automatically routed to the remaining uplinks and
connectivity is maintained.
Link Aggregation (802.3ad)
Link aggregation allows trunking of up to eight links on a single logical
connection, for up to 80 Gbps of redundant bandwidth per logical
connection.
Multi-Switch LAG (M-LAG)
M-LAG can address bandwidth limitations and improve network resiliency,
in part by routing network trac around bottlenecks, reducing the risks of
a single point of failure, and allowing load balancing across multiple
switches.Hardware Redundancy
Hardware Redundancy
Summit X670 series switches support a dual redundant AC/DC power
supply to provide high availability. The power supply can be hot-swapped
and replaced should it fail. Summit X670 also supports N+1 redundant
hot-swappable fan trays.
Robust IP and MAC Security Framework
Media Access Control (MAC) Lockdown
MAC security allows the lockdown of a port to a given MAC address and
limiting the number of MAC addresses on a port. This capability can be
used to dedicate ports to specific hosts or devices such as VoIP phones or
printers and avoid abuse of the port—a capability that can be especially
useful in environments such as hotels. In addition, an aging timer can be
configured for the MAC lockdown, protecting the network from the eects
of attacks using (often rapidly) changing MAC addresses.
IP Security
ExtremeXOS IP security framework helps protect the network
infrastructure, network services such as DHCP and DNS and host
computers from spoofing and man-in-the-middle attacks. It also protects
the network from statically configured and/or spoofed IP addresses and
builds an external trusted database of MAC/IP/port bindings providing the
trac’s source from a specific address for immediate defense.
Identity Management
Identity Manager allows network managers to track users who access their
network. User identity is captured based on NetLogin authentication, LLDP
discovery and Kerberos snooping. ExtremeXOS uses the information to
then report on the MAC, VLAN, computer hostname, and port location of
the user. Further, Identity Manager can create both roles and policies, and
then bind them together to create role-based profiles based on
organizational structure or other logical groupings, and apply them across
multiple users to allow appropriate access to network resources. In
addition, support for Wide Key ACLs further improves security by going
beyond the typical source/destination and MAC address as identification
criteria access mechanism to provide filtering capabilities.
2+1 Redundant Fan Tray
VIM4 Slot
Redundant AC/DC PSU
Page view 3
1 2 3 4 5 6 7 8 9 10

Comments to this Manuals

No comments