Cisco WS-CBS3032-DEL Datasheet Page 2

  • Download
  • Add to my manuals
  • Print
  • Page
    / 11
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 1
Data Sheet
All contents are Copyright © 1992–2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 11
ensure network security, high availability, and QoS from the server edge to the clients at the
network edge.
Cisco Catalyst switches, including the Cisco Catalyst Blade Switch 3032, enable companies to
realize the full benefits of adding intelligent services to their networks. These capabilities make the
server network infrastructure:
Secure, to protect confidential information
Highly available, to meet on time-critical needs
Capable of differentiating and controlling traffic flows to handle the increasing number of
critical business applications
Easily manageable, to reduce operational expenses
Enhanced Security
With the wide range of security features that the Cisco Catalyst Blade Switch 3032 offers,
businesses can protect important information, keep unauthorized people off the network, guard
privacy, and maintain uninterrupted operation.
To guard against denial-of-service (DoS) and other attacks, access control lists (ACLs) can be
used to restrict access to sensitive portions of the network, blocking unauthorized access to
servers and applications by denying packets based on source and destination MAC addresses, IP
addresses, and TCP and User Datagram Protocol (UDP) ports. ACL lookups are performed in
hardware, so forwarding performance is not compromised when ACL-based security is
implemented.
Port security can be used to limit access on an Ethernet port based on the MAC address of the
device to which the port is connected. Port security can also control the total number of devices
plugged into a switch port, reducing the risk from unauthorized servers plugged into the blade
enclosure.
Secure Shell (SSH) Protocol, Kerberos Protocol, and Simple Network Management Protocol
Version 3 (SNMPv3) encrypt administrative and network management information, protecting the
network from tampering and eavesdropping. TACACS+ and RADIUS authentication enable
centralized access control of switches and restrict unauthorized users from altering the
configurations. Alternatively, a local user name and password database can be configured on the
switch itself. Fifteen levels of authorization on the switch console and two levels on the Web-based
management interface provide the capability to give different levels of configuration capabilities to
different administrators.
The MAC address notification feature can be used to monitor the network and track servers by
sending an alert to a management station so that network administrators know when and where
servers are plugged into or removed from a blade enclosure. The Dynamic Host Configuration
Protocol (DHCP) Interface Tracker (Option 82) feature can provide location-based IP address
assignment by providing both the switch and the port ID to a DHCP server. An Option 82-aware
DHCP server such as the Cisco Network Registrar can use this information to assign the specific
IP address to the requesting server.
The Private VLAN and Private VLAN Edge features isolate ports on a switch, helping ensure that
traffic travels directly from the entry point to the aggregation device through a virtual path and
Page view 1
1 2 3 4 5 6 7 ... 10 11

Comments to this Manuals

No comments