
6
Extreme Networks Data Sheet: Summit X450a Series
Comprehensive Security Management
Implementing a secure network means providing protection at the network perimeter as well as the core.
Summit X450a switches use advanced security functions in protecting your network from known or potential threats.
User Authentication and Host
Integrity Checking
Network Login and Dynamic Security Profile
SummitX450aseriesswitchessupportacomprehensiverange
ofNetworkLoginoptionsbyprovidingan802.1xagent-based
approach,aWeb-based(agent-less)logincapability,anda
MAC-basedauthenticationmodel.WiththesemodesofNetwork
Login,onlyauthorizedusersanddevicescanconnecttothe
networkandbeassignedtotheappropriateVLAN.TheUniversal
PortfeatureavailableinSummitX450aletsyouimplement
DynamicSecurityProleswithNetworkLoginandallowsyouto
implementne-grainedandrobustsecuritypolicies.Upon
authentication,theswitchcanloaddynamicACL/QoSproles
forauserorgroupofuserstodeny/allowaccesstotheapplica-
tionserversorsegmentswithinthenetwork.
Multiple Supplicant Support
Convergednetworkdesignsofteninvolvetheuseofshared
portsthatrepresentapotentialvulnerabilityinanetwork.
Multiplesupplicantcapabilitiesonaswitchallowittouniquely
recognizeandapplytheappropriatepoliciesforeachuseror
deviceonasharedport.
Media Access Control (MAC) Lockdown
MACsecurityallowsthelockdownofaporttoagivenMAC
addressandlimitingthenumberofMACaddressesonaport.
Thiscanbeusedtodedicateportstospecichostsordevices
suchasVoIPphonesorprinters,andavoidabuseoftheport—a
capabilitythatcanbeespeciallyusefulinenvironmentssuchas
hotels.Inaddition,anagingtimercanbeconguredforthe
MAClockdown,protectingthenetworkfromtheeectsof
attacksusing(oftenrapidly)changingMACaddresses.
IP Security
ExtremeXOSIPsecurityframeworkprotectsthenetwork
infrastructure,networkservicessuchasDHCPandDNS,and
hostcomputersfromspoongandman-in-the-middleattacks.
Italsoprotectsthenetworkfromstaticallyconguredand/or
spoofedIPaddresses.Itbuildsanexternaltrusteddatabaseof
MAC/IP/portbindingssoyouknowwheretracfromaspecic
addresscomesfromforimmediatedefense.
Identity Manager
IdentityManagerallowsnetworkmanagerstotrackuserswho
accesstheirnetwork.Useridentityiscapturedbasedon
NetLoginauthentication,LLDPdiscoveryandKerberos
snooping.ExtremeXOSusestheinformationtothenreporton
theMAC,VLAN,computerhostname,andportlocationofthe
user.Further,IdentityManagercancreatebothrolesand
policies,andthenbindthemtogethertocreaterole-based
prolesbasedonorganizationalstructureorotherlogical
groupings,andapplythemacrossmultipleuserstoallow
appropriateaccesstonetworkresources.Inaddition,support
forWideKeyACLsfurtherimprovessecuritybygoingbeyond
thetypicalsource/destinationandMACaddressasidentica-
tioncriteriaaccessmechanismtoprovidelteringcapabilities.
Host Integrity
Hostintegritycheckingkeepsinfectedornon-compliant
machinesothenetwork.SummitX450aseriessupportahost
andendpointintegritysolutionthatisbasedonamodel
promotedbytheTrustedComputingGroup.
Threat Detection and Response
CLEAR-Flow Security Rules Engine
CLEAR-FlowSecurityRulesEngineprovidesrstorderthreat
detectionandmitigation,andmirrorstractoappliancesfor
furtheranalysisofsuspicioustracinthenetwork.
sFlow
sFlow®isasamplingtechnologythatprovidestheabilityto
sampleapplicationleveltracowsonallinterfaces
simultaneously.
Port Mirroring
Toallowthreatdetectionandprevention,SummitX450a
switchessupportmany-to-oneandone-to-manyportmirror-
ing.Thisallowsthemirroringoftractoanexternalnetwork
appliancesuchasanintrusiondetectiondevicefortrend
analysisorforutilizationbyanetworkadministratorfor
diagnosticpurposes.Portmirroringcanalsobeenabledacross
switchesinastack.
Kommentare zu diesen Handbüchern