Netgear XCM8806PC-10000S Datasheet Page 5

  • Download
  • Add to my manuals
  • Print
  • Page
    / 18
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 4
NETGEAR
®
8800 Series Chassis Switch XCM8800
- 5 -
in the switch increase not only reliability but also the switching fabric and throughput. Two
Supervisory modules provide switching capacity for up to 800 Gbps of fabric bandwidth and
570 Mpps Layer 2-Layer 3 hardware forwarding rate.
IPv6 packet forwarding makes available trillions of new IP addresses and offers better address
allocation and address aggregation. Other features of IPv6 provide signicantly greater end-
to-end network connectivity and services. NETGEAR 8800 Series switches support IPv6 today,
preparing enterprises to handle IPv6 trafc as this trafc enters their networks.
NETGEAR 8800 Series switches support 8 queues per port. Network managers can identify
and predictably handle high-priority trafc, using QoS technologies that include rate-limiting or
trafc policing on ingress, 802.1q tagging and DiffServ marking, and shaping on egress. These
trafc priority applications contribute to low-latency, high-performance, voice-grade networks.
NETGEAR 8800 Series switches incorporate Link Layer Discovery Protocol (LLDP) to simplify
trouble-shooting of enterprise networks. LLDP enhances the ability of network management
tools to discover and maintain accurate network topologies.
NETGEAR 8800 Series switches can offer PoE on every port, for large IP telephony or wireless
AP deployments. A NETGEAR 8800 Series switch can support up to 288 Class 3 PoE devices,
or up to 384 Class 1 or 2 PoE devices in a single chassis without adding an external power tray.
The NETGEAR 8800 Series Chassis Switches typically consume 1.5 Watts (2.1 Watts maximum)
per Gigabit Ethernet port and 7.0 Watts (10.4 Watts maximum) per 10 Gigabit Ethernet port,
allowing for considerable savings in power and cooling costs.
ComprehensiveSecurity
NETGEAR 8800 Series switches provide Enterprise-class security at the network perimeter as
well as the core, using a variety of security technologies to protect your network from known
or potential threats.
User authentication and host integrity checking enforce admission and usage policies on
dedicated and shared ports at the edge of the network. The powerful sFlow® technology
provides threat detection and response by offering continuous and simultaneous monitoring
of application-level trafc ows on all interfaces. In the event of an attack, network managers
can dynamically recongure the switches to close vulnerabilities, hardening the network
without shutting down network operation.
Port mirroring can be used to mirror trafc to an external network appliance such as an
intrusion detection device, for trend analysis. Mirrored trafc can also be used by a network
administrator as a diagnostic tool when fending off a network attack. NETGEAR 8800 Series
switches support many-to-one and cross-module port mirroring.
DoS protection provides graceful handling of DoS attacks. If the switch detects an unusually
large number of packets in the CPU input queue, it assembles ACLs that automatically stop
these packets from reaching the CPU. After a period of time, the ACLs are removed. If the
attack continues, they are reinstalled. In addition, ASIC-based longest prex match (LPM)
routing eliminates the need for control plane software to learn new ows and allows the
network to be resilient under a DoS attack.
Hardware-based, line-rate ACLs use Layer 2, 3, or 4 header information, such as the MAC
address, IP source/destination address, or TCP/UDP port number, to regulate access to
the network.
Policy-based routing provides a exible mechanism for network administrators to customize the
ow of trafc within the network. Packets are selected according to their ACL match conditions,
such as QoS, VLAN, IP addresses, protocol, port number or other criteria, and redirected from
their normal path to another physical port.
Secure management protocols such as SSH2, SCP, and SNMPv3 prevent the interception
of management communications, while MD5 authentication of routing protocols prevents
attackers from tampering with valid messages and attacking routing sessions.
Page view 4
1 2 3 4 5 6 7 8 9 10 ... 17 18

Comments to this Manuals

No comments