¡æ
Wireless
¡æBlackDiamond
 *Overview
 *BlackDiamond
   12804R

 *BlackDiamond
   12804C

 *BlackDiamond
   10808 Series

 *BlackDiamond
   8800 Series

 *BlackDiamond
   6800 Series

 *Comparison Chart

¡æAlpine
¡æSummit

 


BlackDiamond 12804C Series

¿À´Ã³¯ÀÇ ±â¾÷³×Æ®¿öÅ©´Â ÁýÁßÇüÀÌ °è¼ÓµÇ¸ç, ³×Æ®¿öÅ©ÀÇ Áß¾Ó°ú ÁýÇÕ·¹À̾¼­ application-level ÀνÄÀ» À§ÇÑ Áõ°¡µÇ´Â Çʿ伺¿¡ ±â¹ÝÇÑ´Ù.

ÁýÁß³×Æ®¿öÅ©ÀÇ ¸®´õ·Î½á, Extreme Networks® Àº BlackDiamond 12804C ½ºÀ§Ä¡·Î ÀÌ´õ³Ý ³×Æ®¿öÅ·À» À§ÇÑ »õ·Î¿î ¼öÁØÀÇ Áö´ÉÀ» Á¦°øÇÑ´Ù. 

 

BlackDiamond 12804C´Â, BlackDiamond 10808 °°ÀÌ ÇÁ·Î±×·¥ÀÌ °¡´ÉÇÑ ASIC technology ÅëÇÕÇÑ´Ù.

ÀÌ ÇÁ·Î±×·¥ ´É·ÂÀº Ç÷§ÆûÀÌ ºñ¿ëÀûÀÎ Çϵå¿þ¾î ¾÷±×·¹ÀÌµå ¾øÀÌ »õ·Î¿î ÇÁ·ÎÅäÄÝÀ» Áö¿øÇÒ°ÍÀ» È®½ÅÇÑ´Ù.

 

BlackDiamond 12804C ´Â °í¼öÇà, È®À强°ú ³ôÀº¼öÁØÀÇ Åº·Â¼ºÀ» ÇÊ¿ä·Î ÇÏ´Â Áß¾ÓÀ̳ª ÁýÇÕ ¾îÇø®ÄÉÀ̼ǿ¡ ÀÌ»óÀûÀÌ´Ù.

´õ¿í Áß¿äÇÑ°ÍÀº, BlackDiamond 12804C ´Â ÇöÀç»Ó¸¸ ¾Æ´Ï¶ó Â÷¼¼´ëÀÇ Çʿ伺À» ÃæÁ·½ÃÄÑÁÖ±â À§ÇØ ¼³°èµÇ¾ú´Ù.

È®À强Àº º¯È­ÇÏ´Â ¿ä±¸»çÇ×À» Áö¿ø°ú ÀÀ´ëÇÒ¼ö ÀÖ´Â Áö´ÉÀûÀÎ Áß¾Ó ³×Æ®¿öÅ©¸¦ ¼³°èÇϱâÀ§ÇÑ ÇÙ½ÉÀÌ´Ù.

 

Target Applications

BlackDiamond 12804C ´Â ¾îÇø®ÄÉÀ̼ÇÀÇ ´Ù¾çÇÑ ¹èÄ¡¿¡ ¿ì¼öÇϵµ·Ï ¼³°èµÇ¾ú´Ù. 

  • Áß·¼Ò±â¾÷À» À§ÇÑ ÇÙ½É ¾îÇø®ÄÉÀ̼Ç
  • º¸¾Èȯ°æÀ» À§ÇÑ ÀüÅëÀûÀÎ ±â°¡ºñÆ®³ª 10±â°¡ºñÆ® ÀÌ´õ³Ý ÁýÇÕ½ºÀ§Ä¡ 

¾îÇø®ÄÉÀÌ¼Ç ¼öÇàÀ» °­È­ÇϱâÀ§ÇÑ ¼³°è

  • QoS¿Í ¾îÇø®ÄÉÀÌ¼Ç È®À强À» Á¦°øÇÏ´Â ¼öÇà
  • multicast(´Ù¼öÀü¼Û) ¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ ½Ã½ºÅÛ È®À强
  • ÀÌ´õ³Ý ÀÚµ¿¹æ¾î ½ºÀ§Äª(EAPS) À» ÀÌ¿ëÇÏ´Â °íÀ̿뼺 ³×Æ®¿öÅ© 

Voice-Class Availability 

  • ÃæºÐÇÑ hardware design
  • ExtremeXOS¢â modular operating system
  • ÀÌ´õ³Ý ÀÚµ¿¹æ¾î ½ºÀ§Äª(EAPS) À» ÀÌ¿ëÇÏ´Â °íÀ̿뼺 ³×Æ®¿öÅ© 

Resiliency Under Attack(³×Æ®¿öÅ© °ø°Ý¿¡ ´ëÇÑ Åº·Â¼º) 

  • CLEAR-Flow Security Rules Engine À¸·Î ħÀÔŽÁö¿Í ÀÀ´ë
  • °í°´µµ¸ÞÀÎÀ» ºÐ¸®ÇϱâÀ§ÇÑ Layer 3 Virtual Switching
  • °­È­µÈ ³×Æ®¿öÅ© ÀÎÇÁ¶ó 

Designed to Enforce Application Performance

BlackDiamond 12804C ´Â ¾î¶²±â´ÉÀÌ »ç¿ëµÇ´ø°£¿¡ µ¶¸³ÀûÀÎ deterministic ¼öÇàÀ» Á¦°øÇÑ´Ù.

 

Application Scalability(È®À强)

QoS Performance 

BlackDiamond 12804C ´Â architecture Àüü¿¡ deep packet buffer ¸¦ Àü´ÞÇϸç, È¥Àâ½Ã°£¿¡¼­ Á¶Â÷µµ ÆÐŶÀº ´ë±âµÉ¼ö ÀÖÀ¸¸ç

½Å·Ú¼ºÀÖ°Ô Àü´ÞµÈ´Ù.

¹Ý¸é¿¡ ÀÌ·¯ÇÑ È¥Àâ½Ã°£ µ¿¾È¿¡ ´ë±â½Ã°£ÀÌ Áõ°¡µÇ¸é, Àú±Þ ½ºÀ§Ä¡´Â ÃÊ°úµÇ´Â Æ®·¡ÇÈÀ» ¹ö¸±°ÍÀÌ´Ù.

Æ®·¡ÇÈ buffering À¸·Î ÀÎÇØ, ¼­¹ö´Â ³×Æ®¿öÅ©¿Í ÄÄÇ»ÅÍ¿£Áø ¾çÂÊÀÇ È¿À²¼º Áõ°¡·Î ²÷±è°ú ±Ø´ë·Î Áõ°¡ÇÏ´Â Æ®·¡ÇÈÀ» ÀçÀü¼ÛÇÒ ÇÊ¿ä°¡ ¾ø´Ù.

 

Low Latency(³·Àº ´ë±â½Ã°£)

ÁýÇÕ¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ ³×Æ®¿öÅ© ½ºÀ§Ä¡¸¦ ¼±ÅÃÇÒ¶§,

³×Æ®¿öÅ· ÄÄÆ÷³ÍÆ®¸¦ À§ÇÏ¿© ³·Àº ´ë±â½Ã°£À» ¼±ÅÃÇϴ°ÍÀº ´Ù¸¥¿ä¼Ò¿¡ ÀÇÇØ ¹ß»ýÇÑ ÀÛ¾÷´ë±â½Ã°£À» À§ÇÑ ¿©ºÐÃß°¡¸¦ Á¦°øÇÑ´Ù.

64-byte ÆÐŶÀ» À§ÇÑ 9 microsecond ÀÇ ³·Àº ½ºÀ§Äª ´ë±â½Ã°£À¸·Î, BlackDiamond 12804C ´Â ÁýÇÕ¾îÇø®ÄÉÀ̼ǿ¡ ÀÌ»óÀûÀÌ´Ù.

 

Jumbo Frame Support

9,216 byte ÀÇ Jumbo frame Àº BlackDiamond 12804C ¿¡ ÀÇÇؼ­ Áö¿øµÈ´Ù.

Jumbo frame Àº °í¼öÇà cluster computing application ¿¡¼­ Ưº°È÷ Áß¿äÇϸç, ¿¬±¸°á°ú¿¡ ÀÇÇϸé À̵éÀÇ ÀÌ¿ëÀº

¼­¹öºÎ´ãÀ» 50% ¸¸Å­À̳ª ÁÙ¿©ÁÙ¼öÀÖ´Ù.

Jumbo frame Àº ¶ÇÇÑ ÇÁ·ÎÅäÄÝ overhead ¸¦ ÁÙ¿©ÁÖ¸ç protocol header °¡ °íÁ¤µÈ Å©±â°¡ µÈÈÄ·Î ³ôÀº Àüü³×Æ®¿öÅ© 󸮷®À» È®½ÅÇϸç,

Ä¿´Ù¶õ frame Àº packet header ¸¦ ÇâÇÑ packet payload ÀÇ ³ôÀººñÀ²À» °¡Áø´Ù.

 

Multicast

BlackDiamond 12804C ´Â Çϵå¿þ¾î ÀÎÁõ°ú multicast traffic ÀÇ replication Áö¿øÀ¸·Î, IP multicast ¿¡¼­ Extreme Networks'

leadership position À» °¡Á®´ÙÁÖ¾ú´Ù.  

Extreme Networks unique switch fabric architecture ´Â fabric À» °¡·ÎÁö¸£´Â °°Àº ÆÐŶÀÇ ´Ù¼öÀúÀå°ú Àü¼ÛÀÌ ÇÊ¿äÄ¡ ¾Ê´Ù.

ÀÌ°ÍÀº ½ºÀ§Ä¡¸¦ ÅëÇÏ´Â ´Ù¸¥ ¿î¿µÁßÀÎ Æ®·¡ÇÈ¿¡ ¿µÇâÀ» ÁÖÁö¾Ê°í ¶Ù¾î³­ multicast ¼öÇàÀ» È®½ÅÇÑ´Ù.

 

Multicast Ư¡Àº ÀÎÅÍ³Ý±×·ì °ü¸® ÇÁ·ÎÅäÄÝ(IGMPv2 & v3) °ú ÇÁ·ÎÅäÄÝ µ¶¸³ Multicast (PIM)¸¦ Æ÷ÇÔÇÑ´Ù.

¾çÂÊ´Ù Sparse Mode ¿Í Dense Mode PIM ÀÌ Áö¿øµÈ´Ù.

 

 

Scalable Management Through Extensibility  

Ease of Management

Extreme ³×Æ®¿öÅ©´Â ³×Æ®¿öÅ©¸¦ ´Ù·ç´Âµ¥ À־ ½Ã°£°ú ¸®¼Ò½º¸¦ Àý¾àÇØÁÖ´Â ¹ß´ÞµÈ tool À» °¡Áö°íÀÖ´Ù.

EPICenter® ´Â ÁýÇÕ³×Æ®¿öÅ©¿¡¼­ Extreme Networks' multi-layer switching Àåºñ¸¦ ´Ù·ç±âÀ§ÇØ all fault configuration

(¹«Á¤ÁöÇü ȯ°æ¼³Á¤), accounting, performance, security ±â´ÉÀ» Á¦°øÇÑ´Ù.

EPICenter Policy Manager ´Â Layer 1-4 ¸¦ À§ÇÑ ·¹ÀÌ¾î µ¶¸³Á¤Ã¥ ½ÃÇàÀ» Á¦°øÇÑ´Ù.

Extreme ÀÇ software application, ServiceWatch® ´Â °­·ÂÇÑ Layers 4-7 monitoring °ú mission-critical ³×Æ®¿öÅ© ¼­ºñ½º¸¦ À§ÇÑ °ü¸®¸¦

Àü´ÞÇÑ´Ù.

  

Extensibility to Integrate New Applications

ExtremeXOS ´Â OS½Ã½ºÅÛ°ú Á÷Á¢ÀûÀ¸·Î »óÈ£ÀÛ¿ëÀ» À§ÇÑ ³×Æ®¿öÅ©¿¡¼­ third-party ¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ mechanism Á¦°øÇÔ À¸·Î½á

³×Æ®¿öÅ© ´É·ÂÀÇ À¶Å뼺ÀÖ´Â È®ÀåÀ» Çã¿ëÇÑ´Ù.

ExtremeXOS ´Â best-of-breed monitoring °ú º¸¾ÈÀåºñ¿Í »óÈ£ÀÛ¿ëÀ» À§Çؼ­ secure XML-based API ¸¦ ÀÌ¿ëÇÑ´Ù.

ÀÌ È®À强Àº »õ·Î¿î ¸ð´ÏÅ͸µ°ú ¹ÝÀÀ´É·ÂÀ» À§ÇÑ closed loop À» Á¦°øÇϱâ À§ÇØ third-party ¾îÇø®ÄÉÀ̼ǰú »óÈ£ÀÛ¿ëÀ» Çã¿ëÇÑ´Ù.

(Figure 1 Âü°í)

 

 

Converged Network Analyzer

 

Extreme ³×Æ®¿öÅ©ÀÇ ÁýÇÕ³×Æ®¿öÅ© ºÐ¼®½ºÀ§Ä¡(Analyzer Switch) ´Â LAN»ó¿¡¼­ °íÇ°Áú QoS¸¦ Á¦°øÇÑ´Ù.

Avaya® ÀÇ ÁýÇÕ³×Æ®¿öÅ© ºÐ¼®±â´Â (CNA) WAN »ó¿¡¼­ QoS ¸¦ ÃÖÀûÈ­ ÇϱâÀ§ÇÑ ´É·ÂÀ¸·Î Extreme Networks LAN advantage ¸¦

Çâ»ó½Ã±â±â À§ÇÑ ´É·ÂÀ» Á¦°øÇÑ´Ù. Extreme ³×Æ®¿öÅ© ÀÎÇÁ¶ó¿Í °áÇÕµÈ CNA ¿Í LAN»óÀÇ QoS ´Â Voice-over-IP (VoIP) ¿Í ´Ù¸¥

business-critical ¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ ÃÖÀûÈ­µÈ end-to-end IP ³×Æ®¿öÅ©¸¦ Á¦°øÇÑ´Ù.

  

Extreme ³×Æ®¿öÅ©´Â ExtremeXOS ±â¹Ý ½ºÀ§Ä¡¿¡¼­ Avaya¡¯s CNA monitoring software ¸¦ ³»ÀåÇÏ°íÀÖ´Ù.

CNA ´Â IP WAN ³×Æ®¿öÅ© »ó¿¡¼­ »ó¹ÝµÇ´Â ¾îÇø®ÄÉÀÌ¼Ç ¼öÇàÀ¸·Î addressing issue ¿¡ ÀÇÇØ ³×Æ®¿öÅ©¸¦ Á»´õ ½Å·Ú¼ºÀÖ°Ô ¸¸µç´Ù.

CNA ¼ÒÇÁÆ®¿þ¾î´Â ±âÁ¸¿¡ ¾Ë·ÁÁø°Í°ú ´Ù¸¥ ¾îÇø®ÄÉÀ̼ǿ¡ ¿µÇâÀ»ÁÖ´Â ¹®Á¦µéÀ» À§ÇÏ¿© IP ³×Æ®¿öÅ©¸¦ °¨½ÃÇÑ´Ù.

optional Adaptive Path Controller module Àº Çϳª°¡ ÀÌ¿ë°¡´ÉÇÒ¶§ ¾ðÁ¦¶óµµ Á»´õ³ªÀº ¼öÇàÀ» ¼±ÅÃÇÔ¿¡ ÀÇÇØ ³×Æ®¿öÅ© »ó¿¡¼­ ¹®Á¦Á¡À»

Àû±ØÀûÀ¸·Î ÇÇÇϱâ À§ÇØ À̵é Æò°¡°á°ú(assessment result) ¸¦ ÀÌ¿ëÇÑ´Ù.

 

Voice-Class Availability

°í¼º´É ³×Æ®¿öÅ© Á¢¼ÓÀ¸·Î, ´ë±Ô¸ð·Î PCs ,IP telephone ¼­¹ö¿¡ »ó°ü¾øÀÌ ÀÌ¿ëÇϴµ¥ ¸Å¿ì À¯¿ëÇÏ´Ù.

BlackDiamond 12804C ´Â ½ºÀ§Ä¡ ¼­ºñ½º ÁߴܾøÀÌ OS ¾÷±×·¹À̵尡 °¡´ÉÇÏ´Ù.

BlackDiamond ExtremeXOS ´Â Extreme ³×Æ®¿öÅ©ÀÇ industry-leading ¸ðµâ·¯ OSÀ̸ç,

Network level ź·ÂÀûÀÎ ÇÁ·ÎÅäÄÝÀÌ ³×Æ®¿öÅ© À̿뼺À» Áõ°¡½ÃÅ°±â À§ÇØ Ãß°¡µÇ¾ú´Ù.

 

Redundant Hardware Design

Fully Redundant Management Modules (1:1) 

BlackDiamond 12804C ´Â hitless failover(´ëüÀÛµ¿) mechanism À¸·Î ±¸¼ºµÇ¾îÀÖ´Ù.

°ü¸®½ºÀ§Ä¡ ¸ðµâ(MSM) ¿À·ù½Ã¿¡, second MSM ÀÌ Àüü ½ºÀ§Ä¡¸¦ À§ÇØ ÀÚµ¿À¸·Î °ü¸®¿Í ½ºÀ§Äª Ã¥ÀÓÀ» Àμö¹ÞÀ» °ÍÀÌ´Ù.

ÀÌƯ¡Àº ¿î¿µÁßÀÎ À½¼º°ú ´Ù¸¥ mission-critical ¾îÇø®ÄÉÀÌ¼Ç ³×Æ®¿öÅ©¿¡ ÇʼöÀûÀÌ´Ù.

  

Advanced Chassis Design for Availability  

BlackDiamond 12804C ´Â °í¸³µÈ Á¦¾î¿Í data plane, ÆÄ¿öºÐ¹è¸¦ À§ÇÑ redundant controller board, ³×Æ®¿öÅ© À̿뼺¿¡ ¿µÇâÀ» ÁÖ´Â

¾ÇÀÇÀû ¿ä¼Ò¸¦ ½Äº°Çϱâ À§ÇÑ È¯°æ¸ð´ÏÅ͸µ°ú °°Àº °íÀ̿뼺 ¼³°è ¿ä¼Ò·Î ÀÎÇØ »óÈ£ º¸¿ÏµÇ´Â backplane À» Æ÷ÇÔÇÑ´Ù.

  

Redundant Load Sharing Power Supplies 

BlackDiamond 12804C ´Â µ¿½Ã¿¡ 6°³ ±îÁöÀÇ ³»ºÎ ÆÄ¿ö¼­ÇöóÀ̸¦ °øÀ¯Çؼ­ ÀûÀçÇÒ¼ö ÀÖ´Â ÃæºÐÇÑ ÆÄ¿ö ȯ°æ¼³Á¤À» Áö¿øÇÑ´Ù.

À̵é ÆÄ¿ö¼­ÇöóÀÌ´Â ÆÄ¿ö¼­ÇöóÀÌ Áߺ¹(redundancy)À» À§ÇØ N + 1 ȯ°á¼ºÁ¤À̳ª ¸ðµÎ ÀûÀçµÈ »þ½Ã¸¦ À§ÇÑ ÆÄ¿öÁߺ¹(redundancy)À»

Á¦°øÇϱâÀ§ÇØ N + N ȯ°æ¼³Á¤À¸·Î ±¸¼ºµÉ¼ö ÀÖ´Ù.

 

 

Modular Operating System for Non-stop Operations

Hitless Software Upgrade 

BlackDiamond 12804C ´Â hitless ¼ÒÇÁÆ®¿þ¾î ¾÷±×·¹À̵带 Áö¿øÇϸç, °ü¸®À©µµ¿ì³ª ½ºÀ§Ä¡ ÁߴܾøÀÌ ½ºÀ§Ä¡ ¾÷±×·¹À̵带 Çã¿ëÇÑ´Ù.

ÀÌ°ÍÀº ³×Æ®¿öÅ© °¡µ¿½Ã°£À» Áõ°¡½ÃÅ°¸ç ³×Æ®¿öÅ© »ç¿ëÁß´Ü ¾øÀÌ »õ·Î¿î ¼ÒÇÁÆ®¿þ¾î Ư¡ÀÇ ÀÌÁ¡À» ÃëÇϴ°ÍÀ» Çã¿ëÇÑ´Ù.

 

True Preemptive Multitasking and Protected Memory

ExtremeXOS ´Â Figure 2 ¿¡¼­ º¸¿©ÁÖ´Â °Íó·³ °¢±â ´Ù¸¥°ÍÀ¸·ÎºÎÅÍ º¸È£µÇ´Â ºÐ¸®µÈ OS ¿¡¼­ ¿î¿µÇϱâ À§ÇÑ OSPF ¿Í ½ºÆд×Æ®¸® °°Àº

°¢±â ´Ù¸¥ÀÛ¾÷À» Çã¿ëÇÑ´Ù.

  

Process Monitoring and Restart

ExtremeXOS ´Â ½Ç½Ã°£À¸·Î µ¶¸³ÀûÀÎ OS ó¸® ¸ð´ÏÅ͸µÀ¸·Î ³×Æ®¿öÅ© À̿뼺À» ±Øµµ·Î Çâ»ó½ÃŲ´Ù.

¸¸¾à ÀÌÁß Çϳª¶óµµ ÀÀ´äÀÌ ¾ø°Å³ª ¿î¿µÀÌ ÁßÁöµÈ´Ù¸é, ÀÚµ¿À¸·Î Àç½ÃÀ۵ȴÙ.

 

 

Loadable Software Modules

ExtremeXOS ÀÇ ¸ðµâ·¯ ¼³°è´Â »õ·Î¿î OS À̹ÌÁö ·Îµù°ú ½ºÀ§Ä¡ Àç½ÃÀÛ¾øÀÌ ±â´ÉÀûÀÎ ½ºÀ§Ä¡ È®ÀåÀ» Çã¿ëÇÑ´Ù.

»õ·Î¿î ±â´É¼ºÀº ¿î¿µÁßÀÎ ½ºÀ§Ä¡¿¡ Ãß°¡µÉ¼öÀÖ´Ù.

 

 

High Availability Network Protocols

 

Ethernet Automatic Protection Switching

EAPS ´Â IP network ¿¡ ź·Â¼º°ú À¯ÀúµéÀÌ ÀüÅëÀûÀÎ À½¼º ³×Æ®¿öÅ©·Î ºÎÅÍ ±â´ëÇÏ´Â °¡µ¿½Ã°£À» Á¦°øÇÑ´Ù.

EAPS ´Â Spanning Tree ³ª  Rapid Spanning Tree º¸´Ù ¿ì¼öÇϸç, sub-second (50 milliseconds º¸´Ù ÀûÀº) ȸº¹À» Á¦°øÇÑ´Ù.

´ëºÎºÐÀÇ »óȲ¿¡¼­, EAPS ´Â ³×Æ®¿öÅ©°¡ ¸µÅ© ¿À·ù·ÎºÎÅÍ °ÅÀÇ Åõ¸íÇÏ°Ô È¸º¹µÇ´Â°ÍÀ» °¡´ÉÇÏ°Ô Çϱ⠶§¹®¿¡  VoIP call Àº ¶³¾îÁöÁö

¾ÊÀ¸¸ç µðÁöÅÐ ºñµð¿À °ø±ÞÀº µ¿°áµÇ°Å³ª  pixelize °¡ µÇÁö¾Ê´Â´Ù.

 

Spanning Tree/Rapid Spanning Tree Protocols

BlackDiamond 12804C ´Â Layer 2 ź·Â¼ºÀ» À§ÇÑ Spanning Tree, VLAN Spanning Tree (802.1D), Rapid Spanning Tree (802.1w)

ÇÁ·ÎÅäÄÝÀ» Áö¿øÇÑ´Ù.

 

Software Enhanced Availability

Software Enhanced Availability ´Â ³×Æ®¿öÅ© ÀÎÇÁ¶óÁß ºÎºÐÀÌ ´Ù¿îµÇ¾úÀ»¶§ Á¶Â÷µµ À¯ÀúµéÀÌ ³×Æ®¿öÅ©¿¡ ¿¬°áµÈ »óÅ×·Î ³²¾ÆÀÖ°Ô ÇØÁØ´Ù.

ExtremeXOS ´Â  OSPF ,VRRP ,ESRP (Layer 2 ³ª Layer 3 ¿¡¼­ Áö¿øµÇ´Â ESRP) ¿Í °°Àº Áøº¸µÈ Layer 3 ÇÁ·ÎÅäÄÝÀ» ÀÌ¿ëÇÏ¿©

³×Æ®¿öÅ© ¿¬°á ¹®Á¦Á¡À» ²ÙÁØÈ÷ üũÇÑ´Ù.

 

Equal Cost Multipath

Equal Cost Multipath ´Â ¸µÅ©°¡ ·Îµå¹ë·±½º µÇ°ÔÇϸç ÃæºÐÇÑ ´ëüÀÛµ¿À» Áö¿øÇÏ´Â µ¿¾È¿¡ ºñ¿ëÀý°¨ÀÌ °¡´ÉÇÏ°ÔÇÑ´Ù.

¸µÅ© ¿À·ù½Ã¿¡´Â, Æ®·¡ÇÈÀº ÀÚµ¿À¸·Î ³²¾ÆÀÖ´Â ¸µÅ©·Î ÀüȯµÇ¸ç ¿¬°á»óÅ·Π³²°ÔµÈ´Ù.

 

Link Aggregation (802.3ad)

Cross module link aggregation Àº ´ÜÀÏÁö¿ª ¿¬°á¿¡¼­ 8°³ ±îÁöÀÇ trunking À» °¡´ÉÇÏ°Ô Çϸç, Áö¿ª¿¬°á ¸¶´Ù ÃæºÐÇÑ ´ë¿ªÆøÀÎ 80 Gbps

±îÁö °¡´ÉÇÏ°ÔÇÑ´Ù.

 

Resiliency Under Attack

BlackDiamond 12804C ´Â Ethernet core networking À» À§ÇÑ »õ·Î¿î ·¹º§ÀÇ º¸¾ÈÀ» Àü´ÞÇÑ´Ù.

BlackDiamond 12804C ´Â ÇöÀç º¸È£µÇÁö ¾Ê´Â ³×Æ®¿öÅ©ÀÇ soft interior º¸È£¿¡ ÀÇÇؼ­ perimeter firewall À» º¸¿ÏÇÑ´Ù.

°¡ÀåÁøº¸µÈ CLEAR-Flow Security Rules Engine À» ÀÌ¿ëÇÔ À¸·Î½á, ÀÚµ¿Å½Áö°¡ ÇÁ·Î±×·¥ µÉ¼öÀÖÀ¸¸ç ´Ü½Ã°£³»¿¡ º¸¾ÈÀ§ÇùÀ» °æ°¨½ÃŲ´Ù.

 

 

Threat Detection and Response

CLEAR-Flow Security Rules Engine

CLEAR-Flow Security Rules Engine Àº first order ħÀÔŽÁö¿Í °æ°¨ ±×¸®°í ³×Æ®¿öÅ© »ó¿¡¼­ Àǽɽº·¯¿î Æ®·¡ÇÈÀÇ ´õ³ªÀº ºÐ¼®À» À§ÇÑ

°¡»óÈ­µÈ º¸¾È ¸®¼Ò½º(VSRs) ¸¦ À§ÇÑ mirror traffic À» Á¦°øÇÑ´Ù.

VSRs ´Â Àüü multi-gigabit ³×Æ®¿öÅ©¸¦ ÅëÇÏ¿© °¡»óÀ¸·Î ÀÌ¿ë°¡´ÉÇÏ´Ù. ±×·¯¹Ç·Î º¸¾È ¼Ö·ç¼ÇÀÇ ºñ¿ëÀý°¨ÀûÀÎ È®À强À» °¡´ÉÇÏ°ÔÇÑ´Ù.

 

¿¹¸¦µé¾î, Extreme ³×Æ®¿öÅ©ÀÇ Sentriant¢â VSR Àº BlackDiamond 12804C ½ºÀ§Ä¡ÀÇ CLEARFlow rule °ú Ãß°¡µÇ´Â Æ®·¡ÇÈÀ» °¨½ÃÇϰųª

°Ë»ç ½ÃÁ¡À» º¯°æÇϱâ À§ÇÑ Access Control List(ALCs)ÀÇ Ãß°¡/¼öÁ¤ÀÌ °¡´ÉÇÏ´Ù. ±×·¯¹Ç·Î ½Ç½Ã°£À¸·Î °Ë»ç±ÔÄ¢À» Á¶Á¤Çϱâ À§ÇÑ ÀÚµ¿È­µÈ

½Ã½ºÅÛÀ» Çã¿ëÇÑ´Ù.

 

Port Mirroring

BlackDiamond 12804C ´Â manyto-one °ú cross module port mirroring À» Áö¿øÇÑ´Ù.

ÀÌ°ÍÀº ³×Æ®¿öÅ© °ø°Ý¿¡ ´ëÀÀÇÒ¶§ Áø´ÜÅø·Î½á °æÇâºÐ¼®À̳ª ³×Æ®¿öÅ© °ü¸®ÀÚ¿¡ ÀÇÇØ È°¿ëµÇ±â À§ÇÑ Ä§ÀÔŽÁö ÀåÄ¡¿Í °°Àº ¿ÜºÎ³×Æ®¿öÅ©

Àåºñ¸¦ À§ÇÑ mirror traffic ¿¡ ÀÌ¿ëµÉ¼öÀÖ´Ù.

 

Line-Rate Access Control Lists

ACLs ´Â ³×Æ®¿öÅ© ÀÚ¿øÈ°¿ë Á¦¾î¿Í ³×Æ®¿öÅ© º¸¾È¹× ¹æ¾î¸¦ ÇϱâÀ§ÇÑ °¡Àå °­·ÂÇÑ µµ±¸ÁßÀÇ ÇϳªÀÌ´Ù.

BlackDiamond 12804C ´Â Layer 2, 3 ³ª MAC address ȤÀº IP source/destination address ¿Í °°Àº 4-header information ¿¡ ±â¹ÝÇÑ

¼öõ°³ÀÇ ACLs ¸¦ Áö¿øÇÑ´Ù.

 

Layer 3 Virtual Switching

Layer 3 °¡»ó½ºÀ§ÄªÀ¸·Î, BlackDiamond 12804C ´Â multi-layer switching À» À§ÇÑ °¡»óÈ­ÀÇ °³³äÀ» °¡Á®¿Â´Ù.

Layer 3 °¡»ó½ºÀ§ÄªÀº ´ÜÀÏ ½ºÀ§Ä¡¸¦ ´Ù¼ö °¡»ó¶ó¿ìÅÍ·Î ºÐÇÒÀ» Çã¿ëÇÑ´Ù.

Layer 3 °¡»ó½ºÀ§Ä¡´Â ¹°¸®Àû ¶ó¿ìÅÍ°¡ Çϴ°Ͱú °°Àº ´É·Â°ú property(¸Å°³º¯¼ö)¸¦ °¡Áö°íÀÖ´Ù.

ȯ°æ¼³Á¤, ¿î¿µ, ¹®Á¦ÇØ°áÀ» À§ÇÑ ¸ðµç °°Àº ¶ó¿ìÆà ¸ÞÄ«´ÏÁòÀ» »ó¼ÓÇÑ´Ù.

ÀÌ °á°ú·Î½á, °¢°¢ °¡»ó½ºÀ§Ä¡ µµ¸ÞÀÎÀº ºÐ¸®µÈ °ü¸®¿Í ¾ÈÀüÇÑ º¸¾ÈÀ» À§ÇØ °í¸³µÉ¼öµµ ÀÖ´Ù.

 

³×Æ®¿öÅ© Æ®·¡ÇÈÀº º¸¾ÈÀ§ÇùÀ» ÃÖ¼ÒÈ­ ÇϱâÀ§ÇØ ºÐ¸®µÈ °¡»ó µµ¸ÞÀÎÀ¸·Î °Ý¸®µÉ¼öÀÖ´Ù.

°¢±â °¡»ó½ºÀ§Ä¡¸¦ À§ÇÑ ºÐ¸®µÈ ¶ó¿ìÅÍ Å×À̺íÀº ¶ó¿ìÅÍ ºÐ¸®¸¦ °¡´ÉÇÏ°ÔÇÑ´Ù.

Layer 3 °¡»ó½ºÀ§ÄªÀº ¿î¿µÀÚ°¡ overlapping IP ÁÖ¼Ò°ø°£À» ÀÌ¿ëÇÒ¼öÀÖ°Ô ÇØÁÖ¸ç ´ÜÀÏ ¹°¸®Àû ³×Æ®¿öÅ· ÀÎÇÁ¶ó¸¦ °øÀ¯ÇϱâÀ§ÇØ

´Ù¼ö Ä¿¹Â´ÏƼ¸¦ Áö¿øÇÑ´Ù.

 

 

Hardened Network Infrastructure

Denial of Service Protection

BlackDiamond 12804C ´Â DOS °ø°ÝÀ» ÈǸ¢È÷ ´Ù·é´Ù.

¸¸¾à ½ºÀ§Ä¡°¡ CPU ÀÔ·Â ´ë±â¿­¿¡¼­ ºñÁ¤»óÀûÀ¸·Î ¸¹Àº ÆÐŶÀ» ŽÁöÇÑ´Ù¸é, CPU µµ´Þ·ÎºÎÅÍ À̵éÆÐŶÀ» ÀÚµ¿À¸·Î ¸ØÃß´Â ACLs¸¦

¼ÒÁýÇÒ °ÍÀÌ´Ù. ¾ó¸¶ÈÄ¿¡, ACLs´Â »èÁ¦µÇ¸ç °ø°ÝÀÌ °è¼ÓµÈ´Ù¸é, ´Ù½Ã ¼³Ä¡µÈ´Ù.

 

ASIC-based Longest Prefix Match

Longest Prefix Match (LPM) routing Àº »õ·Î¿î È帧À» ¹è¿ì±âÀ§ÇÑ control plane ¼ÒÇÁÆ®¿þ¾îÀÇ Çʿ伺À» °æ°¨½ÃÅ°¸ç

³×Æ®¿öÅ©°¡ DoS °ø°Ý¿¡ ź·ÂÀûÀ¸·Î µÈ´Ù.

LPM À¸·Î ÀÎÇÏ¿© CPU´Â ¾î¶°ÇÑ ÀνĵÇÁö¾ÊÀº ¸ñÀûÁö¸¦ ÇâÇÑ first packet Àü¼Û¿¡ ºÎ´ãÀ» °¡ÁöÁö ¾ÊÀ¸¸ç,

Áß´ë¾÷¹«¸¦ À§ÇØ CPU¸¦ ÀÚÀ¯·Ó°Ô ÇÑ´Ù.

 

Secure Management

SSH2, SCP ,SNMPv3 ¿Í °°Àº ÇÁ·ÎÅäÄÝÀÇ ÀÌ¿ëÀº BlackDiamond 12804C ½ºÀ§Ä¡°¡ °ü¸®¿î¿ëÀÇ ¹æÇØ¿Í man-in-the-middle

°ø°ÝÀ» ¿¹¹æÇÑ´Ù.

 

MD5 Authentication of Routing Protocols

¶ó¿ìÆà ÇÁ·ÎÅäÄÝÀÇ MD5 ½ÂÀÎÀº °ø°ÝÀÚ°¡ À¯È¿¸Þ½ÃÁö º¯°æ°ú ¶ó¿ìÆà ¼¼¼Ç °ø°ÝÀ» ÇÏÁö¸øÇÏ°Ô ÇÑ´Ù.

 

 

Automated Attack Mitigation

  1. °¨¿°µÈ source ³×Æ®¿öÅ©·Î µé¾î°¨.
  2. BlackDiamond 12804C static ACLs ¿Í CLEAR-Flow rules DoS °ø°ÝÀ» °É·¯³»¸ç ¼ö»óÇÑ Æ®·¡ÇÈÀ¸·Î °£ÁÖÇÔ.
  3. ½ÉÃþºÐ¼®À» À§ÇØ Sentriant ·Î Selectively port-mirror traffic À» º¸³¿
  4. Sentriant ´Â ¼ö»óÇÑ Æ®·¡ÇÈ °¨½Ã¸¦ °è¼ÓÇÏ¸ç ¼ö»óÇÑ °ÍÀ¸·ÎºÎÅÍ À§Çè¼öÁرîÁö Æ®·¡ÇÈ µî±ÞÀ» ´Ü°èÀûÀ¸·Î È®´ëÇϱâ À§ÇØ ³»ºÎ ±ÔÁ¤À»
    ÀÌ¿ëÇÑ´Ù.
  5. Sentriant ´Â BlackDiamond 12804C ¿¡¼­ dynamic ACL À» ½ÃÀÛÇÑ´Ù.
  6. BlackDiamond 12804C ´Â ½Ç½Ã°£À¸·Î dynamic ACL À» Àû¿ëÇÏ¸ç ¼ö»óÇÑ Æ®·¡ÇÈ port mirror ¸¦ °è¼ÓÇÑ´Ù.
  7. Sentriant ´Â ¶ÇÇÑ Extreme Networks EPICenter ³×Æ®¿öÅ© °ü¸® ¼ÒÇÁÆ®¿þ¾î·Î mitigation action(¿ÏÈ­ÀÛ¿ë) À» º¸³½´Ù.
  8. EPICenter ´Â º¸¾ÈÁ¤Ã¥(mitigation action) °­È­¸¦ À§ÇØ Áß¾Ó°ú ÇϴܽºÀ§Ä¡¿Í ÀÛµ¿ÇÑ´Ù.

 

 

Target Applications

 

Enterprise Core

BlackDiamond 12804C ´Â ³×Æ®¿öÅ© Çʿ伺À» ¿Ïº®ÇÏ°Ô ¸¸Á·½ÃÅ°´Â ÀÌ»óÀûÀÎ ¹éº»½ºÀ§Ä¡ ¼Ö·ç¼ÇÀ» Áß·¼Ò±â¾÷¿¡ Á¦°øÇÑ´Ù.

BlackDiamond 12804C ÀÇ CLEARFlow Security Rules Engine °ú Layer 3 °¡»ó½ºÀ§Äª ´É·ÂÀº ¹éº» º¸¾ÈÀ» °­È­ÇÑ´Ù.

ExtremeXOS ¿¡¼­ Á¦°øÇÏ´Â È®À强Àº ±â¾÷¹éº»ÀÌ best-in-class security product ·Î °­ÇÏ°Ô ÅëÇյǵµ·Ï ÇÑ´Ù.

 

 

Traditional Aggregation Layer

Extreme ³×Æ®¿öÅ©´Â two-tier ³×Æ®¿öÅ©°¡ ´õ °£ÆíÇÑ Á¢±ÙÀ̶ó°í ¹Ï´Â ¹Ý¸é¿¡, building À̳ª campus wiring plan ÀÇ ·¹À̾ƿôÀº °¡²û ÁýÇÕ

·¹À̾ ÇÊ¿ä·ÎÇÑ´Ù. ÀÌ ·¹À̾î´Â ÀüÇüÀûÀ¸·Î ÇϴܽºÀ§Ä¡·Î ºÎÅÍ ±â°¡ºñÆ®³ª 10±â°¡ºñÆ® ¾÷¸µÅ©¸¦ ÅëÇÕÇϸç, ±â°¡ºñÆ®¿Í 10±â°¡ºñÆ®

¾÷¸µÅ©¸¦ ÅëÇÏ¿© Áß¾Ó±îÁö ¿¬°áÇÑ´Ù.

BlackDiamond 12804C ´Â °í¼öÇà°ú ÁýÇÕ ·¹À̾ À§ÇØ ¿ä±¸µÇ´Â fault-tolerance(¹«Á¤ÁöÇü) ¿¬°á¼ºÀ» À§ÇÑ Çʿ伺À» º¸¿©ÁØ´Ù.

 

Technical Specifications

ExtremeXOS 11.6 Supported Protocols

Switching

  • RFC 3619 Ethernet Automatic Protection Switching (EAPS) and EAPSv2
  • IEEE 802.1D - 1998 Spanning Tree Protocol (STP)
  • IEEE 802.1D - 2004 Spanning Tree Protocol (STP and RSTP)
  • IEEE 802.1w - 2001 Rapid Reconfiguration for STP, RSTP
  • IEEE 802.1Q-2003 (formerly IEEE 802.1s) Multiple Instances of STP, MSTP
  • EMISTP, Extreme Multiple Instances of Spanning Tree Protocol
  • PVST+, Per VLAN STP (802.1Q interoperable)
  • Extreme Standby Router Protocol (ESRP)
  • IEEE 802.1Q - 1998 Virtual Bridged Local Area Networks
  • IEEE 802.3ad Static load sharing configuration and LACP based dynamic configuration
  • IEEE 802.1AB - LLDP Link Layer Discovery Protocol
  • LLDP Media Endpoint Discovery (LLDP-MED), ANSI/TIA-1057, draft 08
  • Extreme Discovery Protocol (EDP)
  • Extreme Loop Recovery Protocol (ELRP)
  • Extreme Link State Monitoring (ELSM)
  • Software Redundant Ports

VLANs, vMANs + MAC-in-MAC

  • IEEE 802.1Q VLAN Tagging
  • IEEE 802.1v: VLAN classification by Protocol and Port
  • Port-based VLANs
  • Protocol-based VLANs
  • Multiple STP domains per VLAN
  • IEEE 802.1ad Virtual MANs (vMANs)
  • IEEE 802.1ah/D1.2 MAC-in-MAC Provider Bridging

Quality of Service and Policies

  • IEEE 802.1D - 1998 (802.1p) Packet Priority
  • RFC 2474 DiffServ Precedence, including 8 queues/port
  • RFC 2598 DiffServ Expedited Forwarding (EF)
  • RFC 2597 DiffServ Assured Forwarding (AF)
  • RFC 2475 DiffServ Core and Edge Router Functions

IPv4

  • RFC 1812 Requirements for IP Version 4 Routers
  • RFC 1519 CIDR
  • RFC 1256 IPv4 ICMP Router Discovery (IRDP)
  • RFC 1122 Host Requirements
  • RFC 768 UDP
  • RFC 791 IP
  • RFC 792 ICMP
  • RFC 793 TCP
  • RFC 826 ARP
  • RFC 894 IP over Ethernet
  • RFC 1027 Proxy ARP
  • RFC 2068 HTTP server ??Used for web-based Network Login
  • RFC 2338 VRRP
  • Static Unicast Routes
  • Static Multicast Routes
  • RFC 1058 RIP v1
  • RFC 2453 RIP v2
  • RFC 2328 OSPF v2 (including MD5 authentication)
  • RFC 1587 OSPF NSSA Option
  • RFC 1765 OSPF Database Overflow
  • RFC 2370 OSPF Opaque LSA Option
  • RFC 3623 OSPF Graceful Restart
  • RFC 1112 IGMP v1
  • RFC 2236 IGMP v2
  • RFC 3376 IGMP v3
  • IGMP v1/v2/v3 Snooping with Configurable Router Registration Forwarding
  • IGMP Filters
  • Static IGMP Membership
  • Multicast VLAN Registration
  • RFC 2362 PIM-SM
  • RFC 3569, draft-ietf-ssm-arch-06.txt PIM-SSM PIM Source Specific Multicast

IPv6

  • RFC 2460, Internet Protocol, Version 6 (IPv6) Specification
  • RFC 2461, Neighbor Discovery for IP Version 6, (IPv6)
  • RFC 2462, IPv6 Stateless Address Auto configuration - Router Requirements
  • RFC 2463, Internet Control Message Protocol (ICMPv6) for the IPv6 Specification
  • RFC 2464, Transmission of IPv6 Packets over Ethernet Networks
  • RFC 2465, IPv6 MIB, General Group and Textual Conventions
  • RFC 2466, MIB for ICMPv6
  • RFC 1981, Path MTU Discovery for IPv6, August 1996 - Router requirements
  • RFC 3513, Internet Protocol Version 6 (IPv6) Addressing Architecture
  • RFC 3587, Global Unicast Address Format
  • RFC 2710, IPv6 Multicast Listener Discovery v1 (MLDv1) Protocol
  • RFC 3810, IPv6 Multicast Listener Discovery v2 (MLDv2) Protocol
  • RFC 2080, RIPng
  • RFC 2893, Configured Tunnels
  • RFC 3056, 6to4
  • Static Unicast routes for IPv6
  • Telnet server over IPv6 transport
  • SSH-2 server over IPv6 transport
  • Ping over IPv6 transport
  • Traceroute over IPv6 transport

Management and Traffic Analysis

  • RFC 2030 SNTP, Simple Network Time Protocol v4
  • RFC 854 Telnet client and server
  • RFC 783 TFTP Protocol (revision 2)
  • RFC 951, 1542 BootP
  • RFC 2131 BOOTP/DHCP relay agent and DHCP server
  • RFC 1591 DNS (client operation)
  • RFC 1155 Structure of Mgmt Information (SMIv1)
  • RFC 1157 SNMPv1
  • RFC 1212, RFC 1213, RFC 1215 MIB-II, Ethernet-Like MIB & TRAPs
  • RFC 1573 Evolution of Interface
  • RFC 1650 Ethernet-Like MIB (update of RFC 1213 for SNMPv2)
  • RFC 1901 - 1908 SNMP v2c, SMIv2 and Revised MIB-II
  • RFC 2570 - 2575 SNMPv3, user based security, encryption and authentication
  • RFC 2576 Coexistence between SNMP Version 1, Version 2 and Version 3
  • RFC 1757 RMON 4 groups: Stats, History, Alarms and Events
  • RFC 2021 RMON2 (probe configuration)
  • RFC 2668 802.3 MAU MIB
  • RFC 1643 Ethernet MIB
  • RFC 1493 Bridge MIB
  • RFC 1354 IPv4 Forwarding Table MIB
  • RFC 2737 Entity MIB v2
  • RFC 2233 Interface MIB
  • RFC 3621 PoE-MIB (BlackDiamond 8800 only)
  • RFC 1354 IP Forwarding Table MIB
  • RFC 1724 RIPv2 MIB
  • RFC 1850 OSPFv2 MIB
  • RFC 1657 BGP-4 MIB
  • Draft-ietf-idr-bgp4-mibv2-02.txt- ?Enhanced BGP-4 MIB
  • draft-ietf-pim-mib-v2-o1.txt
  • RFC 2787 VRRP MIB
  • Draft-ietf-bridge-rstpmib-03.txt - Definitions of Managed Objects for Bridges with Rapid Spanning Tree Protocol
  • Secure Shell (SSH-2) client and server
  • Secure Copy (SCP-2) client and server
  • Secure FTP (SFTP) server
  • IEEE 802.1ag/D4.1 L2 Ping and traceroute
  • sFlow version 5
  • Configuration logging
  • Multiple Images, Multiple Configs
  • BSD System Logging Protocol (SYSLOG), with Multiple Syslog Servers

-999 Local Messages (criticals stored across reboots)

  • ExtremeWare vendor MIBs (includes FDB, PoE, CPU, Memory MIBs) http://www.extremenetworks.com/services/documentation

Security

  • Routing protocol MD5 authentication (see above)
  • Secure Shell (SSH-2), Secure Copy (SCP-2) and SFTP client/server with encryption/authentication (requires export controlled encryption module)
  • SNMPv3 user based security, with encryption/ authentication (see above)
  • RFC 1492 TACACS+
  • RFC 2138 RADIUS Authentication
  • RFC 2139 RADIUS Accounting
  • RFC 3579 RADIUS EAP support for 802.1x
  • RADIUS Per-command Authentication
  • Access Profiles on All Routing Protocols
  • Access Policies for Telnet/SSH-2/SCP-2
  • Network Login - 802.1x, web and MAC-based mechanisms
  • IEEE 802.1x ??2001 Port-Based Network Access Control for Network Login
  • Multiple supplicants with multiple VLANs for Network Login (all modes)
  • Fallback to local authentication database (MAC and Web-based methods)
  • Guest VLAN for 802.1x
  • RFC 1866 HTML - Used for web-based Network Login
  • SSL/TLS transport- ?used for for web-based Network Login, (requires export controlled encryption module)
  • MAC Security - Lockdown and Limit
  • IP Security - RFC 3046 DHCP Option 82 with port and VLAN ID
  • IP Security - DHCP enforcement via Disable ARP Learning
  • IP Security - Gratuitous ARP Protection
  • IP Security - Trusted DHCP Server
  • IP Security - DHCP Secured ARP / ARP Validation
  • Layer 2/3/4 Access Control Lists (ACLs)
  • CLEAR-Flow, threshold based alerts and actions

Denial of Service Protection:

  • RFC 2267 Network Ingress Filtering
  • RPF (Unicast Reverse Path Forwarding) Control via ACLs
  • Wire-speed ACLs
  • Rate Limiting / Shaping by ACLs
  • IP Broadcast Forwarding Control
  • ICMP and IP-Option Response Control
  • SYN attack protection
  • CPU DoS Protection with traffic rate-limiting to management CPU
  • Robust against common Network Attacks:
    - CERT (http://www.cert.org)
    - CA-2003-04: "SQL Slammer"
    - CA-2002-36: "SSHredder"
    - CA-2002-03: SNMP vulnerabilities
    - CA-98-13: tcp-denial-of-service
    - CA-98.01: smurf
    - CA-97.28:Teardrop_Land -Teardrop and "LAND" attack
    - CA-96.26: ping
    - CA-96.21: tcp_syn_flooding
    - CA-96.01: UDP_service_denial
    - CA-95.01: IP_Spoofing_Attacks_and_Hijacked_ Terminal_Connections
    - IP Options Attack
  • Host Attacks

-Teardrop, boink, opentear, jolt2, newtear, nestea, syndrop, smurf, fraggle, papasmurf, synk4, raped, winfreeze, ping-f, ping of death, pepsi5, Latierra, Winnuke, Simping, Sping, Ascend, Stream, Land, Octopus

Core Protocols: only available on switches with Core-License capability:

  • PIM-DM Draft IETF PIM Dense Mode draft-ietfidmr-pim-dm-05.txt, draft-ietf-pim-dm-new-v2-04. txt
  • RFC 2740, OSPF for IPv6
  • RFC 1771 Border Gateway Protocol 4
  • RFC 1965 Autonomous System Confederations for BGP
  • RFC 2796 BGP Route Reflection (supersedes RFC 1966)
  • RFC 1997 BGP Communities Attribute
  • RFC 1745 BGP4/IDRP for IP - OSPF Interaction
  • RFC 2385 TCP MD5 Authentication for BGPv4
  • RFC 2439 BGP Route Flap Damping
  • RFC 2842 Capabilities Advertisement with BGP-4
  • RFC 2918 Route Refresh Capability for BGP-4
  • draft-ietf-idr-restart-10.txt Graceful Restart Mechanism for BGP
  • EAPSv2 Shared Ports - multiple interconnections between rings

MPLS: requires MPLS Feature Pack license

  • RFC 2205 Reservation Protocol
  • RFC 2961 RSVP Refresh Overhead Reduction Extensions
  • RFC 3031 Multiprotocol Label Switching Architecture
  • RFC 3032 MPLS Label Stack Encoding
  • RFC 3036 LDP
  • RFC 3209 RSVP-TE: Extensions to RSVP for LSP Tunnels
  • RFC 3630 Traffic Engineering Extensions to OSPFv2
  • draft-ietf-l2vpn-vpls-ldp-08
  • draft-ietf-pwe3-control-protocol-17
  • draft-ietf-pwe3-ethernet-encap-11
  • draft-ietf-mpls-lsp-ping-13
  • RFC 3811 Definitions of Textual Conventions (TCs) for Multiprotocol Label Switching (MPLS) Management
  • RFC 3812 Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Management Information Base (MIB)
  • RFC 3813 Multiprotocol Label Switching (MPLS) Label Switching Router (LSR) Management Information Base (MIB)
  • RFC 3815 Definitions of Managed Objects for the Multiprotocol Label Switching (MPLS), Label Distribution Protocol (LDP)
  • draft-ietf-pwe3-pw-mib-06
  • draft-ietf-pwe3-pw-mpls-mib-07
  • draft-ietf-pwe3-enet-mib-06

General Specifications

Switching Capacity

  • 160 Gbps total switching capacity, with 9 microsecond latency for 64-byte packets

MSM and I/O Modules

  • MSM-5: MSM modules contain both the control plane as well as the switch fabric for the BlackDiamond 12804.
  • GM-20XT: 20-port Gigabit Ethernet module. Each port can be used for 10/100/1000BASET or mini-GBIC connectivity (requires mini-GBIC modules)
  • GM-20T: 20-port 10/100/1000BASE-T Gigabit Ethernet module (RJ-45)
  • XM-2X: 2-port 10G module. XENPAK modules required.

Power Supply Options

Both AC and DC power supplies are available

  • AC power supplies can run from 90-264 VAC, and deliver
    -700W at 90V to 120V, or
    -1200W at 200V to 240V
  • 48V DC power supplies deliver 1200W of power

Physical Specifications

Dimensions

  • Chassis: 17.5" high x 17.51" wide x 18.23??deep (44.45 cm x 44.5 cm x 46.3 cm)
  • MSM Module Dimensions: 1.63 "high x 15.26" wide x 15.25" deep (4.1 cm x 38.8 cm x 38.7 cm)
  • I/O Module Dimensions: 1.63??high x 15.26 "wide 15.25" deep (4.1 cm x 38.8 cm x 38.7 cm)

Weight

  • Empty Chassis: 65 lb (29.5 kg)
  • Power Supply: 7 lb (3.2 kg)
  • MSM-5 8.5 lb (3.9 kg)
  • G20XT 8.5 lb (3.9 kg)
  • G20T 7.5 lb (3.4 kg)
  • XM-2X 7 lb (3.2 kg)

Power

  • Chassis with Fan Trays: 45W, 48V, 1.0A (Heat Dissipation: 154 BTU)
  • MSM-5: 185W, 48V, 3.3A (Heat Dissipation: 632 BTU)
  • GM-20XT Module: 161W, 48V, 3.5A (Heat Dissipation: 549 BTU)
  • GM-20T Module: 149W, 48V, 3.5A (Heat Dissipation: 509 BTU)
  • XM-2X Module: 132W, 48V, 2.9A (Heat Dissipation: 450 BTU)

 

Operating Specifications

  • Operating Temperature Range 0¡É to 40¡É (32¡É F to 104¢µ)
  • Operating Humidity: 10% to 95% relative humidity, non-condensing
  • Transportation Temperature: -40¡É to 70¡É (-40¢µ to 158¢µ)
  • Storage and Transportation Humidity: 10% to 95% relative humidity, non-condensing

Regulatory/Safety Standards

North American Safety of ITE

  • UL 60950-1:2003 1st Ed., Listed Device (U.S.)
  • CSA 22.2#60950-1-03 1st Ed.(Canada)
  • Complies with FCC 21CFR Chapter1, Subchapter J (U.S. Laser Safety)
  • CDRH Letter of Approval (U.S. FDA Approval)
  • IEEE 802.3af 6-2003 Environment A for PoE Applications

European Safety of ITE

  • EN60950-1:2001
  • EN 60825-1+A2:2001 (Lasers Safety)
  • TUV-R GS Mark by German Notified Body
  • 73/23/EEC Low Voltage Directive

International Safety of ITE

  • CB Report & Certificate per IEC 609501:2001+All Country Deviations
  • AS/NZX 3260 (Australia/New Zealand)

EMI/EMC Standards

North America EMC for ITE

  • FCC CFR 47 part 15 Class A (USA)
  • ICES-003 Class A (Canada)
  • European EMC standards
  • EN 55022:1998 Class A
  • EN 55024:1998 Class A

- includes IEC 61000-4-2, 3, 4, 5, 6, 8, 11

  • EN 61000-3-2,3 (Harmonics & Flicker)
  • ETSI EN 300 386:2001 (EMC Telecommunications)
  • 89/336/EEC EMC Directive

International EMC Certifications

  • CISPR 22:1997 Class A (International Emissions)
  • CISPR 24:1997 Class A (International Immunity)
  • IEC/EN 61000-4-2 Electrostatic Discharge, 8kV Contact, 15kV Air, Criteria A
  • IEC/EN 61000-4-3 Radiated Immunity 10V/m, Criteria A
  • IEC/EN 61000-4-4 Transient Burst, 1kV, Criteria A
  • IEC/EN 61000-4-5 Surge, 2kV, 4kV, Criteria A
  • IEC/EN 61000-4-6 Conducted Immunity, 0.1580MHz, 10V/m unmod. RMS, Criteria A
  • IEC/EN 61000-4-11 Power Dips & Interruptions, >30%, 25 periods, Criteria C

Country Specific

  • VCCI Class A (Japan Emissions)
  • AS/NZS 3548 ACA (Australia Emissions)
  • CNS 13438:1997 Class A (BSMI-Taiwan)
  • NOM/NYCE (Mexico)
  • MIC Mark, EMC Approval (Korea)

Environmental

  • EN/ETSI 300 019-2-1 v2.1.2 ??Class 1.2 Storage
  • EN/ETSI 300 019-2-2 v2.1.2 ??Class 2.3 Transportation
  • EN/ETSI 300 019-2-3 v2.1.2 ??Class 3.1e Operational
  • EN/ETSI 300 753 (1997-10) ??Acoustic Noise
  • NEBS GR-63 Issue 2 ??Sound Pressure
  • ASTM D3580 Random Vibration Unpackaged 1.5G

Warranty

  • 1-year on Hardware
  • 90-days on Software