HP HP ProCurve Series 6600 Manual do Utilizador Página 3

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 10
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 2
3
Resiliency and high availability
IEEE 802.3ad Link Aggregation Control
Protocol (LACP) and ProCurve trunking:
support up to 60 trunks, each with up to 8 links (ports)
per trunk; trunking across modules is supported
IEEE 802.1s Multiple Spanning Tree: provides
high link availability in multiple VLAN environments by
allowing multiple spanning trees; provides legacy
support for IEEE 802.1d and IEEE 802.1w
Virtual Router Redundancy Protocol
(requires Premium License): VRRP allows groups
of two routers to dynamically back each other up to
create highly available routed environments
Server-to-switch distributed trunking: allows
a server to connect to two switches with one logical
trunk that consists of multiple physical connections;
enables load-balancing and increases resiliency
Sparing simplicity: common power supplies, fan
trays, and transceivers are used among the 6600
series products
Layer 2 switching
ProCurve switch meshing: dynamically
load-balances across multiple active redundant links to
increase available aggregate bandwidth
GARP VLAN Registration Protocol: allows
automatic learning and dynamic assignment of VLANs
IEEE 802.1ad Q-in-Q (requires Premium
License): increases the scalability of Ethernet network
by providing a hierarchical structure; connects multiple
LANs on high-speed campus or metro network
IEEE 802.1v protocol VLANs: isolate select
non-IPv4 protocols automatically into their own VLANs
Layer 3 services
Loopback interface address: defines an
address in RIP and OSPF that can always be
reachable, improving diagnostic capability
UDP helper function: UDP broadcasts can be
directed across router interfaces to specific IP unicast
or subnet broadcast addresses and prevent server
spoofing for UDP services such as DHCP
Layer 3 routing
RIP: provides RIPv1 and RIPv2 routing
Static IP routing: provides manually configured
routing; includes ECMP capability
OSPF (requires Premium License): includes
host-based ECMP to provide link redundancy/scalable
bandwidth and NSSA
Security
Source-port filtering: allows only specified ports
to communicate with each other
RADIUS/TACACS+: eases switch management
security administration by using a password
authentication server
Secure Shell (SSHv2): encrypts all transmitted
data for secure, remote command-line interface (CLI)
access over IP networks
Port security: allows access only to specified
MAC addresses, which can be learned or specified
by the administrator
MAC address lockout: prevents configured
particular MAC addresses from connecting to the
network
Detection of malicious attacks: monitors ten
types of network traffic and sends a warning when an
anomaly that potentially can be caused by malicious
attacks is detected
Secure FTP: allows secure file transfer to/from the
switch; protects against unwanted file downloads or
unauthorized copying of switch configuration file
Switch management logon security: can
require either RADIUS or TACACS+ authentication for
secure switch CLI logon
Secure management access: all access
methods--CLI, GUI, or MIB--are securely encrypted
through SSHv2, SSL, and/or SNMPv3
ICMP throttling: defeats ICMP denial-of-service
attacks by enabling any switch port to automatically
throttle ICMP traffic
Virus throttling: detects traffic patterns typical of
WORM-type viruses and either throttles or entirely
prevents the ability of the virus to spread across the
routed VLANs or bridged interfaces, without requiring
external appliances
STP BPDU port protection: blocks Bridge
Protocol Data Units (BPDUs) on ports that do not
require BPDUs, preventing forged BPDU attacks
Dynamic IP lockdown: works with DHCP
protection to block traffic from unauthorized hosts,
preventing IP source address spoofing
DHCP protection: blocks DHCP packets from
unauthorized DHCP servers, preventing
denial-of-service attacks
Dynamic ARP protection: blocks ARP
broadcasts from unauthorized hosts, preventing
eavesdropping or theft of network data
Vista de página 2
1 2 3 4 5 6 7 8 9 10

Comentários a estes Manuais

Sem comentários