BlackDiamond 12804C Series
¿À´Ã³¯ÀÇ
±â¾÷³×Æ®¿öÅ©´Â ÁýÁßÇüÀÌ °è¼ÓµÇ¸ç, ³×Æ®¿öÅ©ÀÇ Áß¾Ó°ú
ÁýÇÕ·¹À̾¼ application-level ÀνÄÀ» À§ÇÑ Áõ°¡µÇ´Â
Çʿ伺¿¡ ±â¹ÝÇÑ´Ù.
ÁýÁß³×Æ®¿öÅ©ÀÇ
¸®´õ·Î½á, Extreme Networks® Àº BlackDiamond 12804C
½ºÀ§Ä¡·Î ÀÌ´õ³Ý ³×Æ®¿öÅ·À» À§ÇÑ »õ·Î¿î ¼öÁØÀÇ Áö´ÉÀ»
Á¦°øÇÑ´Ù.
BlackDiamond
12804C´Â, BlackDiamond 10808 °°ÀÌ ÇÁ·Î±×·¥ÀÌ °¡´ÉÇÑ
ASIC technology ÅëÇÕÇÑ´Ù.
ÀÌ
ÇÁ·Î±×·¥
´É·ÂÀº Ç÷§ÆûÀÌ ºñ¿ëÀûÀÎ Çϵå¿þ¾î ¾÷±×·¹ÀÌµå ¾øÀÌ »õ·Î¿î
ÇÁ·ÎÅäÄÝÀ» Áö¿øÇÒ°ÍÀ» È®½ÅÇÑ´Ù.
|
|
BlackDiamond
12804C ´Â °í¼öÇà, È®À强°ú ³ôÀº¼öÁØÀÇ Åº·Â¼ºÀ» ÇÊ¿ä·Î ÇÏ´Â Áß¾ÓÀ̳ª
ÁýÇÕ ¾îÇø®ÄÉÀ̼ǿ¡ ÀÌ»óÀûÀÌ´Ù.
´õ¿í
Áß¿äÇÑ°ÍÀº, BlackDiamond 12804C ´Â ÇöÀç»Ó¸¸ ¾Æ´Ï¶ó Â÷¼¼´ëÀÇ Çʿ伺À»
ÃæÁ·½ÃÄÑÁÖ±â À§ÇØ ¼³°èµÇ¾ú´Ù.
È®À强Àº
º¯ÈÇÏ´Â ¿ä±¸»çÇ×À» Áö¿ø°ú ÀÀ´ëÇÒ¼ö ÀÖ´Â Áö´ÉÀûÀÎ Áß¾Ó ³×Æ®¿öÅ©¸¦
¼³°èÇϱâÀ§ÇÑ ÇÙ½ÉÀÌ´Ù.
Target
Applications
BlackDiamond
12804C ´Â ¾îÇø®ÄÉÀ̼ÇÀÇ ´Ù¾çÇÑ ¹èÄ¡¿¡ ¿ì¼öÇϵµ·Ï ¼³°èµÇ¾ú´Ù.
- Áß·¼Ò±â¾÷À»
À§ÇÑ ÇÙ½É ¾îÇø®ÄÉÀ̼Ç
- º¸¾Èȯ°æÀ»
À§ÇÑ ÀüÅëÀûÀÎ ±â°¡ºñÆ®³ª 10±â°¡ºñÆ® ÀÌ´õ³Ý ÁýÇÕ½ºÀ§Ä¡
¾îÇø®ÄÉÀ̼Ç
¼öÇàÀ» °ÈÇϱâÀ§ÇÑ ¼³°è
- QoS¿Í
¾îÇø®ÄÉÀÌ¼Ç È®À强À» Á¦°øÇÏ´Â ¼öÇà
- multicast(´Ù¼öÀü¼Û)
¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ ½Ã½ºÅÛ È®À强
- ÀÌ´õ³Ý
ÀÚµ¿¹æ¾î ½ºÀ§Äª(EAPS) À» ÀÌ¿ëÇÏ´Â °íÀ̿뼺 ³×Æ®¿öÅ©
Voice-Class
Availability
- ÃæºÐÇÑ
hardware design
- ExtremeXOS¢â
modular operating system
- ÀÌ´õ³Ý
ÀÚµ¿¹æ¾î ½ºÀ§Äª(EAPS) À» ÀÌ¿ëÇÏ´Â °íÀ̿뼺 ³×Æ®¿öÅ©
Resiliency
Under Attack(³×Æ®¿öÅ© °ø°Ý¿¡ ´ëÇÑ Åº·Â¼º)
- CLEAR-Flow
Security Rules Engine À¸·Î ħÀÔŽÁö¿Í ÀÀ´ë
- °í°´µµ¸ÞÀÎÀ»
ºÐ¸®ÇϱâÀ§ÇÑ Layer 3 Virtual Switching
- °ÈµÈ
³×Æ®¿öÅ© ÀÎÇÁ¶ó
Designed
to Enforce Application Performance
BlackDiamond
12804C ´Â ¾î¶²±â´ÉÀÌ »ç¿ëµÇ´ø°£¿¡ µ¶¸³ÀûÀÎ deterministic ¼öÇàÀ»
Á¦°øÇÑ´Ù.
Application
Scalability(È®À强)
QoS
Performance
BlackDiamond
12804C ´Â architecture Àüü¿¡ deep packet buffer ¸¦ Àü´ÞÇϸç, È¥Àâ½Ã°£¿¡¼
Á¶Â÷µµ ÆÐŶÀº ´ë±âµÉ¼ö ÀÖÀ¸¸ç
½Å·Ú¼ºÀÖ°Ô
Àü´ÞµÈ´Ù.
¹Ý¸é¿¡
ÀÌ·¯ÇÑ È¥Àâ½Ã°£ µ¿¾È¿¡ ´ë±â½Ã°£ÀÌ Áõ°¡µÇ¸é, Àú±Þ ½ºÀ§Ä¡´Â ÃÊ°úµÇ´Â
Æ®·¡ÇÈÀ» ¹ö¸±°ÍÀÌ´Ù.
Æ®·¡ÇÈ
buffering À¸·Î ÀÎÇØ, ¼¹ö´Â ³×Æ®¿öÅ©¿Í ÄÄÇ»ÅÍ¿£Áø ¾çÂÊÀÇ È¿À²¼º
Áõ°¡·Î ²÷±è°ú ±Ø´ë·Î Áõ°¡ÇÏ´Â Æ®·¡ÇÈÀ» ÀçÀü¼ÛÇÒ ÇÊ¿ä°¡ ¾ø´Ù.
Low
Latency(³·Àº ´ë±â½Ã°£)
ÁýÇÕ¾îÇø®ÄÉÀ̼ÇÀ»
À§ÇÑ ³×Æ®¿öÅ© ½ºÀ§Ä¡¸¦ ¼±ÅÃÇÒ¶§,
³×Æ®¿öÅ·
ÄÄÆ÷³ÍÆ®¸¦ À§ÇÏ¿© ³·Àº ´ë±â½Ã°£À» ¼±ÅÃÇϴ°ÍÀº ´Ù¸¥¿ä¼Ò¿¡ ÀÇÇØ ¹ß»ýÇÑ
ÀÛ¾÷´ë±â½Ã°£À» À§ÇÑ ¿©ºÐÃß°¡¸¦ Á¦°øÇÑ´Ù.
64-byte
ÆÐŶÀ» À§ÇÑ 9 microsecond ÀÇ ³·Àº ½ºÀ§Äª ´ë±â½Ã°£À¸·Î, BlackDiamond
12804C ´Â ÁýÇÕ¾îÇø®ÄÉÀ̼ǿ¡ ÀÌ»óÀûÀÌ´Ù.
Jumbo
Frame Support
9,216
byte ÀÇ Jumbo frame Àº BlackDiamond 12804C ¿¡ ÀÇÇؼ Áö¿øµÈ´Ù.
Jumbo
frame Àº °í¼öÇà cluster computing application ¿¡¼ Ưº°È÷ Áß¿äÇϸç,
¿¬±¸°á°ú¿¡ ÀÇÇϸé À̵éÀÇ ÀÌ¿ëÀº
¼¹öºÎ´ãÀ»
50% ¸¸ÅÀ̳ª ÁÙ¿©ÁÙ¼öÀÖ´Ù.
Jumbo
frame Àº ¶ÇÇÑ ÇÁ·ÎÅäÄÝ overhead ¸¦ ÁÙ¿©ÁÖ¸ç protocol header °¡ °íÁ¤µÈ
Å©±â°¡ µÈÈÄ·Î ³ôÀº Àüü³×Æ®¿öÅ© 󸮷®À» È®½ÅÇϸç,
Ä¿´Ù¶õ
frame Àº packet header ¸¦ ÇâÇÑ packet payload ÀÇ ³ôÀººñÀ²À» °¡Áø´Ù.
Multicast
BlackDiamond
12804C ´Â Çϵå¿þ¾î ÀÎÁõ°ú multicast traffic ÀÇ replication Áö¿øÀ¸·Î,
IP multicast ¿¡¼ Extreme Networks'
leadership position À» °¡Á®´ÙÁÖ¾ú´Ù.
Extreme
Networks unique switch fabric architecture ´Â fabric À» °¡·ÎÁö¸£´Â
°°Àº ÆÐŶÀÇ ´Ù¼öÀúÀå°ú Àü¼ÛÀÌ ÇÊ¿äÄ¡ ¾Ê´Ù.
ÀÌ°ÍÀº
½ºÀ§Ä¡¸¦ ÅëÇÏ´Â ´Ù¸¥ ¿î¿µÁßÀÎ Æ®·¡ÇÈ¿¡ ¿µÇâÀ» ÁÖÁö¾Ê°í ¶Ù¾î³ multicast
¼öÇàÀ» È®½ÅÇÑ´Ù.
Multicast
Ư¡Àº ÀÎÅÍ³Ý±×·ì °ü¸® ÇÁ·ÎÅäÄÝ(IGMPv2 & v3) °ú ÇÁ·ÎÅäÄÝ µ¶¸³
Multicast (PIM)¸¦ Æ÷ÇÔÇÑ´Ù.
¾çÂÊ´Ù
Sparse Mode ¿Í Dense Mode PIM ÀÌ Áö¿øµÈ´Ù.
Scalable
Management Through Extensibility
Ease
of Management
Extreme
³×Æ®¿öÅ©´Â ³×Æ®¿öÅ©¸¦ ´Ù·ç´Âµ¥ ÀÖ¾î¼ ½Ã°£°ú ¸®¼Ò½º¸¦ Àý¾àÇØÁÖ´Â
¹ß´ÞµÈ tool À» °¡Áö°íÀÖ´Ù.
EPICenter®
´Â ÁýÇÕ³×Æ®¿öÅ©¿¡¼ Extreme Networks' multi-layer switching Àåºñ¸¦
´Ù·ç±âÀ§ÇØ all fault configuration
(¹«Á¤ÁöÇü ȯ°æ¼³Á¤), accounting,
performance, security ±â´ÉÀ» Á¦°øÇÑ´Ù.
EPICenter
Policy Manager ´Â Layer 1-4 ¸¦ À§ÇÑ ·¹ÀÌ¾î µ¶¸³Á¤Ã¥ ½ÃÇàÀ» Á¦°øÇÑ´Ù.
Extreme
ÀÇ software application, ServiceWatch® ´Â °·ÂÇÑ Layers 4-7
monitoring °ú mission-critical ³×Æ®¿öÅ© ¼ºñ½º¸¦ À§ÇÑ °ü¸®¸¦
Àü´ÞÇÑ´Ù.
Extensibility
to Integrate New Applications
ExtremeXOS
´Â OS½Ã½ºÅÛ°ú Á÷Á¢ÀûÀ¸·Î »óÈ£ÀÛ¿ëÀ» À§ÇÑ ³×Æ®¿öÅ©¿¡¼ third-party
¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ mechanism Á¦°øÇÔ À¸·Î½á
³×Æ®¿öÅ© ´É·ÂÀÇ À¶Å뼺ÀÖ´Â
È®ÀåÀ» Çã¿ëÇÑ´Ù.
ExtremeXOS
´Â best-of-breed monitoring °ú º¸¾ÈÀåºñ¿Í »óÈ£ÀÛ¿ëÀ» À§Çؼ secure
XML-based API ¸¦ ÀÌ¿ëÇÑ´Ù.
ÀÌ
È®À强Àº »õ·Î¿î ¸ð´ÏÅ͸µ°ú ¹ÝÀÀ´É·ÂÀ» À§ÇÑ closed loop À» Á¦°øÇϱâ
À§ÇØ third-party ¾îÇø®ÄÉÀ̼ǰú »óÈ£ÀÛ¿ëÀ» Çã¿ëÇÑ´Ù.
(Figure 1 Âü°í)
Converged
Network Analyzer
Extreme
³×Æ®¿öÅ©ÀÇ ÁýÇÕ³×Æ®¿öÅ© ºÐ¼®½ºÀ§Ä¡(Analyzer Switch) ´Â LAN»ó¿¡¼
°íÇ°Áú QoS¸¦ Á¦°øÇÑ´Ù.
Avaya®
ÀÇ ÁýÇÕ³×Æ®¿öÅ© ºÐ¼®±â´Â (CNA) WAN »ó¿¡¼ QoS ¸¦ ÃÖÀûÈ ÇϱâÀ§ÇÑ
´É·ÂÀ¸·Î Extreme Networks LAN advantage ¸¦
Çâ»ó½Ã±â±â À§ÇÑ ´É·ÂÀ»
Á¦°øÇÑ´Ù. Extreme
³×Æ®¿öÅ© ÀÎÇÁ¶ó¿Í °áÇÕµÈ CNA ¿Í LAN»óÀÇ QoS ´Â Voice-over-IP (VoIP)
¿Í ´Ù¸¥
business-critical ¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ ÃÖÀûÈµÈ end-to-end
IP ³×Æ®¿öÅ©¸¦ Á¦°øÇÑ´Ù.
Extreme
³×Æ®¿öÅ©´Â ExtremeXOS ±â¹Ý ½ºÀ§Ä¡¿¡¼ Avaya¡¯s CNA monitoring software ¸¦ ³»ÀåÇÏ°íÀÖ´Ù.
CNA
´Â IP WAN ³×Æ®¿öÅ© »ó¿¡¼ »ó¹ÝµÇ´Â ¾îÇø®ÄÉÀÌ¼Ç ¼öÇàÀ¸·Î addressing
issue ¿¡ ÀÇÇØ ³×Æ®¿öÅ©¸¦ Á»´õ ½Å·Ú¼ºÀÖ°Ô ¸¸µç´Ù.
CNA
¼ÒÇÁÆ®¿þ¾î´Â ±âÁ¸¿¡ ¾Ë·ÁÁø°Í°ú ´Ù¸¥ ¾îÇø®ÄÉÀ̼ǿ¡ ¿µÇâÀ»ÁÖ´Â ¹®Á¦µéÀ»
À§ÇÏ¿© IP ³×Æ®¿öÅ©¸¦ °¨½ÃÇÑ´Ù.
optional
Adaptive Path Controller module Àº Çϳª°¡ ÀÌ¿ë°¡´ÉÇÒ¶§ ¾ðÁ¦¶óµµ
Á»´õ³ªÀº ¼öÇàÀ» ¼±ÅÃÇÔ¿¡ ÀÇÇØ ³×Æ®¿öÅ© »ó¿¡¼ ¹®Á¦Á¡À»
Àû±ØÀûÀ¸·Î
ÇÇÇϱâ
À§ÇØ À̵é Æò°¡°á°ú(assessment result) ¸¦ ÀÌ¿ëÇÑ´Ù.
Voice-Class
Availability
°í¼º´É
³×Æ®¿öÅ© Á¢¼ÓÀ¸·Î, ´ë±Ô¸ð·Î PCs ,IP telephone ¼¹ö¿¡ »ó°ü¾øÀÌ ÀÌ¿ëÇϴµ¥
¸Å¿ì À¯¿ëÇÏ´Ù.
BlackDiamond
12804C ´Â ½ºÀ§Ä¡ ¼ºñ½º ÁߴܾøÀÌ OS ¾÷±×·¹À̵尡 °¡´ÉÇÏ´Ù.
BlackDiamond
ExtremeXOS ´Â Extreme ³×Æ®¿öÅ©ÀÇ industry-leading ¸ðµâ·¯ OSÀ̸ç,
Network
level ź·ÂÀûÀÎ ÇÁ·ÎÅäÄÝÀÌ ³×Æ®¿öÅ© À̿뼺À» Áõ°¡½ÃÅ°±â À§ÇØ Ãß°¡µÇ¾ú´Ù.
Redundant
Hardware Design
Fully
Redundant Management Modules (1:1)
BlackDiamond
12804C ´Â hitless failover(´ëüÀÛµ¿) mechanism À¸·Î ±¸¼ºµÇ¾îÀÖ´Ù.
°ü¸®½ºÀ§Ä¡
¸ðµâ(MSM) ¿À·ù½Ã¿¡, second MSM ÀÌ Àüü ½ºÀ§Ä¡¸¦ À§ÇØ ÀÚµ¿À¸·Î °ü¸®¿Í
½ºÀ§Äª Ã¥ÀÓÀ» Àμö¹ÞÀ» °ÍÀÌ´Ù.
ÀÌƯ¡Àº
¿î¿µÁßÀÎ À½¼º°ú ´Ù¸¥ mission-critical ¾îÇø®ÄÉÀÌ¼Ç ³×Æ®¿öÅ©¿¡ ÇʼöÀûÀÌ´Ù.
Advanced
Chassis Design for Availability
BlackDiamond
12804C ´Â °í¸³µÈ Á¦¾î¿Í data plane, ÆÄ¿öºÐ¹è¸¦ À§ÇÑ redundant controller
board, ³×Æ®¿öÅ© À̿뼺¿¡ ¿µÇâÀ» ÁÖ´Â
¾ÇÀÇÀû ¿ä¼Ò¸¦ ½Äº°Çϱâ
À§ÇÑ
ȯ°æ¸ð´ÏÅ͸µ°ú °°Àº °íÀ̿뼺 ¼³°è ¿ä¼Ò·Î ÀÎÇØ »óÈ£ º¸¿ÏµÇ´Â backplane
À» Æ÷ÇÔÇÑ´Ù.
Redundant
Load Sharing Power Supplies
BlackDiamond
12804C ´Â µ¿½Ã¿¡ 6°³ ±îÁöÀÇ ³»ºÎ ÆÄ¿ö¼ÇöóÀ̸¦ °øÀ¯Çؼ ÀûÀçÇÒ¼ö
ÀÖ´Â ÃæºÐÇÑ ÆÄ¿ö ȯ°æ¼³Á¤À» Áö¿øÇÑ´Ù.
À̵é
ÆÄ¿ö¼ÇöóÀÌ´Â ÆÄ¿ö¼ÇöóÀÌ Áߺ¹(redundancy)À» À§ÇØ N + 1 ȯ°á¼ºÁ¤À̳ª
¸ðµÎ ÀûÀçµÈ »þ½Ã¸¦ À§ÇÑ ÆÄ¿öÁߺ¹(redundancy)À»
Á¦°øÇϱâÀ§ÇØ N
+ N ȯ°æ¼³Á¤À¸·Î ±¸¼ºµÉ¼ö ÀÖ´Ù.
Modular
Operating System for Non-stop Operations
Hitless
Software Upgrade
BlackDiamond
12804C ´Â hitless ¼ÒÇÁÆ®¿þ¾î ¾÷±×·¹À̵带 Áö¿øÇϸç, °ü¸®À©µµ¿ì³ª ½ºÀ§Ä¡
ÁߴܾøÀÌ ½ºÀ§Ä¡ ¾÷±×·¹À̵带 Çã¿ëÇÑ´Ù.
ÀÌ°ÍÀº
³×Æ®¿öÅ© °¡µ¿½Ã°£À» Áõ°¡½ÃÅ°¸ç ³×Æ®¿öÅ© »ç¿ëÁß´Ü ¾øÀÌ »õ·Î¿î ¼ÒÇÁÆ®¿þ¾î
Ư¡ÀÇ ÀÌÁ¡À» ÃëÇϴ°ÍÀ» Çã¿ëÇÑ´Ù.
True
Preemptive Multitasking and Protected Memory
ExtremeXOS
´Â Figure 2 ¿¡¼ º¸¿©ÁÖ´Â °Íó·³ °¢±â ´Ù¸¥°ÍÀ¸·ÎºÎÅÍ º¸È£µÇ´Â ºÐ¸®µÈ
OS ¿¡¼ ¿î¿µÇϱâ À§ÇÑ OSPF ¿Í ½ºÆд×Æ®¸® °°Àº
°¢±â ´Ù¸¥ÀÛ¾÷À» Çã¿ëÇÑ´Ù.
Process
Monitoring and Restart
ExtremeXOS
´Â ½Ç½Ã°£À¸·Î µ¶¸³ÀûÀÎ OS ó¸® ¸ð´ÏÅ͸µÀ¸·Î ³×Æ®¿öÅ© À̿뼺À» ±Øµµ·Î
Çâ»ó½ÃŲ´Ù.
¸¸¾à
ÀÌÁß Çϳª¶óµµ ÀÀ´äÀÌ ¾ø°Å³ª ¿î¿µÀÌ ÁßÁöµÈ´Ù¸é, ÀÚµ¿À¸·Î Àç½ÃÀ۵ȴÙ.
Loadable
Software Modules
ExtremeXOS
ÀÇ ¸ðµâ·¯ ¼³°è´Â »õ·Î¿î OS À̹ÌÁö ·Îµù°ú ½ºÀ§Ä¡ Àç½ÃÀÛ¾øÀÌ ±â´ÉÀûÀÎ
½ºÀ§Ä¡ È®ÀåÀ» Çã¿ëÇÑ´Ù.
»õ·Î¿î
±â´É¼ºÀº ¿î¿µÁßÀÎ ½ºÀ§Ä¡¿¡ Ãß°¡µÉ¼öÀÖ´Ù.
High
Availability Network Protocols
Ethernet
Automatic Protection Switching
EAPS
´Â IP network ¿¡ ź·Â¼º°ú À¯ÀúµéÀÌ ÀüÅëÀûÀÎ À½¼º ³×Æ®¿öÅ©·Î ºÎÅÍ
±â´ëÇÏ´Â °¡µ¿½Ã°£À» Á¦°øÇÑ´Ù.
EAPS
´Â Spanning Tree ³ª Rapid Spanning Tree º¸´Ù ¿ì¼öÇϸç,
sub-second (50 milliseconds º¸´Ù ÀûÀº) ȸº¹À» Á¦°øÇÑ´Ù.
´ëºÎºÐÀÇ
»óȲ¿¡¼, EAPS ´Â ³×Æ®¿öÅ©°¡ ¸µÅ© ¿À·ù·ÎºÎÅÍ °ÅÀÇ Åõ¸íÇÏ°Ô È¸º¹µÇ´Â°ÍÀ»
°¡´ÉÇÏ°Ô Çϱ⠶§¹®¿¡ VoIP call Àº ¶³¾îÁöÁö
¾ÊÀ¸¸ç µðÁöÅÐ
ºñµð¿À °ø±ÞÀº µ¿°áµÇ°Å³ª pixelize °¡ µÇÁö¾Ê´Â´Ù.
Spanning
Tree/Rapid Spanning Tree Protocols
BlackDiamond
12804C ´Â Layer 2 ź·Â¼ºÀ» À§ÇÑ Spanning Tree, VLAN Spanning Tree
(802.1D), Rapid Spanning Tree (802.1w)
ÇÁ·ÎÅäÄÝÀ» Áö¿øÇÑ´Ù.
Software
Enhanced Availability
Software
Enhanced Availability ´Â ³×Æ®¿öÅ© ÀÎÇÁ¶óÁß ºÎºÐÀÌ ´Ù¿îµÇ¾úÀ»¶§ Á¶Â÷µµ
À¯ÀúµéÀÌ ³×Æ®¿öÅ©¿¡ ¿¬°áµÈ »óÅ×·Î ³²¾ÆÀÖ°Ô ÇØÁØ´Ù.
ExtremeXOS
´Â OSPF ,VRRP ,ESRP (Layer 2 ³ª Layer 3 ¿¡¼ Áö¿øµÇ´Â ESRP)
¿Í °°Àº Áøº¸µÈ Layer 3 ÇÁ·ÎÅäÄÝÀ» ÀÌ¿ëÇÏ¿©
³×Æ®¿öÅ©
¿¬°á ¹®Á¦Á¡À» ²ÙÁØÈ÷ üũÇÑ´Ù.
Equal
Cost Multipath
Equal
Cost Multipath ´Â ¸µÅ©°¡ ·Îµå¹ë·±½º µÇ°ÔÇϸç ÃæºÐÇÑ ´ëüÀÛµ¿À» Áö¿øÇÏ´Â
µ¿¾È¿¡ ºñ¿ëÀý°¨ÀÌ °¡´ÉÇÏ°ÔÇÑ´Ù.
¸µÅ©
¿À·ù½Ã¿¡´Â, Æ®·¡ÇÈÀº ÀÚµ¿À¸·Î ³²¾ÆÀÖ´Â ¸µÅ©·Î ÀüȯµÇ¸ç ¿¬°á»óÅ·Î
³²°ÔµÈ´Ù.
Link
Aggregation (802.3ad)
Cross
module link aggregation Àº ´ÜÀÏÁö¿ª ¿¬°á¿¡¼ 8°³ ±îÁöÀÇ trunking
À» °¡´ÉÇÏ°Ô Çϸç, Áö¿ª¿¬°á ¸¶´Ù ÃæºÐÇÑ ´ë¿ªÆøÀÎ 80 Gbps
±îÁö °¡´ÉÇÏ°ÔÇÑ´Ù.
Resiliency
Under Attack
BlackDiamond
12804C ´Â Ethernet core networking À» À§ÇÑ »õ·Î¿î ·¹º§ÀÇ º¸¾ÈÀ»
Àü´ÞÇÑ´Ù.
BlackDiamond
12804C ´Â ÇöÀç º¸È£µÇÁö ¾Ê´Â ³×Æ®¿öÅ©ÀÇ soft interior º¸È£¿¡ ÀÇÇؼ
perimeter firewall À» º¸¿ÏÇÑ´Ù.
°¡ÀåÁøº¸µÈ
CLEAR-Flow Security Rules Engine À» ÀÌ¿ëÇÔ À¸·Î½á, ÀÚµ¿Å½Áö°¡ ÇÁ·Î±×·¥
µÉ¼öÀÖÀ¸¸ç ´Ü½Ã°£³»¿¡ º¸¾ÈÀ§ÇùÀ» °æ°¨½ÃŲ´Ù.
Threat
Detection and Response
CLEAR-Flow
Security Rules Engine
CLEAR-Flow
Security Rules Engine Àº first order ħÀÔŽÁö¿Í °æ°¨ ±×¸®°í ³×Æ®¿öÅ©
»ó¿¡¼ Àǽɽº·¯¿î Æ®·¡ÇÈÀÇ ´õ³ªÀº ºÐ¼®À» À§ÇÑ
°¡»óÈµÈ º¸¾È
¸®¼Ò½º(VSRs) ¸¦ À§ÇÑ mirror traffic À» Á¦°øÇÑ´Ù.
VSRs
´Â Àüü multi-gigabit ³×Æ®¿öÅ©¸¦ ÅëÇÏ¿© °¡»óÀ¸·Î ÀÌ¿ë°¡´ÉÇÏ´Ù. ±×·¯¹Ç·Î
º¸¾È ¼Ö·ç¼ÇÀÇ ºñ¿ëÀý°¨ÀûÀÎ È®À强À» °¡´ÉÇÏ°ÔÇÑ´Ù.
¿¹¸¦µé¾î,
Extreme ³×Æ®¿öÅ©ÀÇ Sentriant¢â VSR Àº BlackDiamond 12804C ½ºÀ§Ä¡ÀÇ
CLEARFlow rule °ú Ãß°¡µÇ´Â Æ®·¡ÇÈÀ» °¨½ÃÇϰųª
°Ë»ç ½ÃÁ¡À» º¯°æÇϱâ
À§ÇÑ Access Control List(ALCs)ÀÇ Ãß°¡/¼öÁ¤ÀÌ °¡´ÉÇÏ´Ù. ±×·¯¹Ç·Î
½Ç½Ã°£À¸·Î °Ë»ç±ÔÄ¢À» Á¶Á¤Çϱâ À§ÇÑ ÀÚµ¿ÈµÈ
½Ã½ºÅÛÀ» Çã¿ëÇÑ´Ù.
Port
Mirroring
BlackDiamond
12804C ´Â manyto-one °ú cross module port mirroring À» Áö¿øÇÑ´Ù.
ÀÌ°ÍÀº
³×Æ®¿öÅ© °ø°Ý¿¡ ´ëÀÀÇÒ¶§ Áø´ÜÅø·Î½á °æÇâºÐ¼®À̳ª ³×Æ®¿öÅ© °ü¸®ÀÚ¿¡
ÀÇÇØ È°¿ëµÇ±â À§ÇÑ Ä§ÀÔŽÁö ÀåÄ¡¿Í °°Àº ¿ÜºÎ³×Æ®¿öÅ©
Àåºñ¸¦
À§ÇÑ mirror traffic ¿¡ ÀÌ¿ëµÉ¼öÀÖ´Ù.
Line-Rate
Access Control Lists
ACLs
´Â ³×Æ®¿öÅ© ÀÚ¿øÈ°¿ë Á¦¾î¿Í ³×Æ®¿öÅ© º¸¾È¹× ¹æ¾î¸¦ ÇϱâÀ§ÇÑ °¡Àå
°·ÂÇÑ µµ±¸ÁßÀÇ ÇϳªÀÌ´Ù.
BlackDiamond
12804C ´Â Layer 2, 3 ³ª MAC address ȤÀº IP source/destination address
¿Í °°Àº 4-header information ¿¡ ±â¹ÝÇÑ
¼öõ°³ÀÇ ACLs ¸¦ Áö¿øÇÑ´Ù.
Layer
3 Virtual Switching
Layer
3 °¡»ó½ºÀ§ÄªÀ¸·Î, BlackDiamond 12804C ´Â multi-layer switching À»
À§ÇÑ °¡»óÈÀÇ °³³äÀ» °¡Á®¿Â´Ù.
Layer
3 °¡»ó½ºÀ§ÄªÀº ´ÜÀÏ ½ºÀ§Ä¡¸¦ ´Ù¼ö °¡»ó¶ó¿ìÅÍ·Î ºÐÇÒÀ» Çã¿ëÇÑ´Ù.
Layer
3 °¡»ó½ºÀ§Ä¡´Â ¹°¸®Àû ¶ó¿ìÅÍ°¡ Çϴ°Ͱú °°Àº ´É·Â°ú property(¸Å°³º¯¼ö)¸¦
°¡Áö°íÀÖ´Ù.
ȯ°æ¼³Á¤,
¿î¿µ, ¹®Á¦ÇØ°áÀ» À§ÇÑ ¸ðµç °°Àº ¶ó¿ìÆà ¸ÞÄ«´ÏÁòÀ» »ó¼ÓÇÑ´Ù.
ÀÌ
°á°ú·Î½á, °¢°¢ °¡»ó½ºÀ§Ä¡ µµ¸ÞÀÎÀº ºÐ¸®µÈ °ü¸®¿Í ¾ÈÀüÇÑ º¸¾ÈÀ» À§ÇØ
°í¸³µÉ¼öµµ ÀÖ´Ù.
³×Æ®¿öÅ©
Æ®·¡ÇÈÀº º¸¾ÈÀ§ÇùÀ» ÃÖ¼ÒÈ ÇϱâÀ§ÇØ ºÐ¸®µÈ °¡»ó µµ¸ÞÀÎÀ¸·Î °Ý¸®µÉ¼öÀÖ´Ù.
°¢±â
°¡»ó½ºÀ§Ä¡¸¦ À§ÇÑ ºÐ¸®µÈ ¶ó¿ìÅÍ Å×À̺íÀº ¶ó¿ìÅÍ ºÐ¸®¸¦ °¡´ÉÇÏ°ÔÇÑ´Ù.
Layer
3 °¡»ó½ºÀ§ÄªÀº ¿î¿µÀÚ°¡ overlapping IP ÁÖ¼Ò°ø°£À» ÀÌ¿ëÇÒ¼öÀÖ°Ô ÇØÁÖ¸ç
´ÜÀÏ ¹°¸®Àû ³×Æ®¿öÅ· ÀÎÇÁ¶ó¸¦ °øÀ¯ÇϱâÀ§ÇØ
´Ù¼ö
Ä¿¹Â´ÏƼ¸¦ Áö¿øÇÑ´Ù.
Hardened
Network Infrastructure
Denial
of Service Protection
BlackDiamond
12804C ´Â DOS °ø°ÝÀ» ÈǸ¢È÷ ´Ù·é´Ù.
¸¸¾à
½ºÀ§Ä¡°¡ CPU ÀÔ·Â ´ë±â¿¿¡¼ ºñÁ¤»óÀûÀ¸·Î ¸¹Àº ÆÐŶÀ» ŽÁöÇÑ´Ù¸é,
CPU µµ´Þ·ÎºÎÅÍ À̵éÆÐŶÀ» ÀÚµ¿À¸·Î ¸ØÃß´Â ACLs¸¦
¼ÒÁýÇÒ
°ÍÀÌ´Ù. ¾ó¸¶ÈÄ¿¡,
ACLs´Â »èÁ¦µÇ¸ç °ø°ÝÀÌ °è¼ÓµÈ´Ù¸é, ´Ù½Ã ¼³Ä¡µÈ´Ù.
ASIC-based
Longest Prefix Match
Longest
Prefix Match (LPM) routing Àº »õ·Î¿î È帧À» ¹è¿ì±âÀ§ÇÑ control plane
¼ÒÇÁÆ®¿þ¾îÀÇ Çʿ伺À» °æ°¨½ÃÅ°¸ç
³×Æ®¿öÅ©°¡
DoS °ø°Ý¿¡ ź·ÂÀûÀ¸·Î µÈ´Ù.
LPM
À¸·Î ÀÎÇÏ¿© CPU´Â ¾î¶°ÇÑ ÀνĵÇÁö¾ÊÀº ¸ñÀûÁö¸¦ ÇâÇÑ first packet
Àü¼Û¿¡ ºÎ´ãÀ» °¡ÁöÁö ¾ÊÀ¸¸ç,
Áß´ë¾÷¹«¸¦
À§ÇØ CPU¸¦ ÀÚÀ¯·Ó°Ô ÇÑ´Ù.
Secure
Management
SSH2,
SCP ,SNMPv3 ¿Í °°Àº ÇÁ·ÎÅäÄÝÀÇ ÀÌ¿ëÀº BlackDiamond 12804C ½ºÀ§Ä¡°¡
°ü¸®¿î¿ëÀÇ ¹æÇØ¿Í man-in-the-middle
°ø°ÝÀ» ¿¹¹æÇÑ´Ù.
MD5
Authentication of Routing Protocols
¶ó¿ìÆÃ
ÇÁ·ÎÅäÄÝÀÇ MD5 ½ÂÀÎÀº °ø°ÝÀÚ°¡ À¯È¿¸Þ½ÃÁö º¯°æ°ú ¶ó¿ìÆà ¼¼¼Ç °ø°ÝÀ»
ÇÏÁö¸øÇÏ°Ô ÇÑ´Ù.
Automated
Attack Mitigation
- °¨¿°µÈ
source ³×Æ®¿öÅ©·Î µé¾î°¨.
- BlackDiamond
12804C static ACLs ¿Í CLEAR-Flow rules DoS °ø°ÝÀ» °É·¯³»¸ç ¼ö»óÇÑ
Æ®·¡ÇÈÀ¸·Î °£ÁÖÇÔ.
- ½ÉÃþºÐ¼®À»
À§ÇØ Sentriant ·Î Selectively port-mirror traffic À» º¸³¿
- Sentriant
´Â ¼ö»óÇÑ Æ®·¡ÇÈ °¨½Ã¸¦ °è¼ÓÇÏ¸ç ¼ö»óÇÑ °ÍÀ¸·ÎºÎÅÍ À§Çè¼öÁرîÁö
Æ®·¡ÇÈ µî±ÞÀ» ´Ü°èÀûÀ¸·Î È®´ëÇϱâ À§ÇØ ³»ºÎ ±ÔÁ¤À»
ÀÌ¿ëÇÑ´Ù.
- Sentriant
´Â BlackDiamond 12804C ¿¡¼ dynamic ACL À» ½ÃÀÛÇÑ´Ù.
- BlackDiamond
12804C ´Â ½Ç½Ã°£À¸·Î dynamic ACL À» Àû¿ëÇÏ¸ç ¼ö»óÇÑ Æ®·¡ÇÈ port
mirror ¸¦ °è¼ÓÇÑ´Ù.
- Sentriant
´Â ¶ÇÇÑ Extreme Networks EPICenter ³×Æ®¿öÅ© °ü¸® ¼ÒÇÁÆ®¿þ¾î·Î mitigation
action(¿ÏÈÀÛ¿ë) À» º¸³½´Ù.
- EPICenter
´Â º¸¾ÈÁ¤Ã¥(mitigation action) °È¸¦ À§ÇØ Áß¾Ó°ú ÇϴܽºÀ§Ä¡¿Í ÀÛµ¿ÇÑ´Ù.
Target
Applications
Enterprise
Core
BlackDiamond
12804C ´Â ³×Æ®¿öÅ© Çʿ伺À» ¿Ïº®ÇÏ°Ô ¸¸Á·½ÃÅ°´Â ÀÌ»óÀûÀÎ ¹éº»½ºÀ§Ä¡
¼Ö·ç¼ÇÀ» Áß·¼Ò±â¾÷¿¡ Á¦°øÇÑ´Ù.
BlackDiamond
12804C ÀÇ CLEARFlow Security Rules Engine °ú Layer 3 °¡»ó½ºÀ§Äª
´É·ÂÀº ¹éº» º¸¾ÈÀ» °ÈÇÑ´Ù.
ExtremeXOS
¿¡¼ Á¦°øÇÏ´Â È®À强Àº ±â¾÷¹éº»ÀÌ best-in-class security product
·Î °ÇÏ°Ô ÅëÇյǵµ·Ï ÇÑ´Ù.
Traditional
Aggregation Layer
Extreme
³×Æ®¿öÅ©´Â two-tier ³×Æ®¿öÅ©°¡ ´õ °£ÆíÇÑ Á¢±ÙÀ̶ó°í ¹Ï´Â ¹Ý¸é¿¡,
building À̳ª campus wiring plan ÀÇ ·¹À̾ƿôÀº °¡²û ÁýÇÕ
·¹À̾
ÇÊ¿ä·ÎÇÑ´Ù. ÀÌ
·¹À̾î´Â ÀüÇüÀûÀ¸·Î ÇϴܽºÀ§Ä¡·Î ºÎÅÍ ±â°¡ºñÆ®³ª 10±â°¡ºñÆ® ¾÷¸µÅ©¸¦
ÅëÇÕÇϸç, ±â°¡ºñÆ®¿Í 10±â°¡ºñÆ®
¾÷¸µÅ©¸¦ ÅëÇÏ¿© Áß¾Ó±îÁö ¿¬°áÇÑ´Ù.
BlackDiamond
12804C ´Â °í¼öÇà°ú ÁýÇÕ ·¹À̾ À§ÇØ ¿ä±¸µÇ´Â fault-tolerance(¹«Á¤ÁöÇü)
¿¬°á¼ºÀ» À§ÇÑ Çʿ伺À» º¸¿©ÁØ´Ù.
Technical Specifications
ExtremeXOS 11.6 Supported Protocols
Switching
- RFC 3619 Ethernet Automatic Protection Switching (EAPS) and EAPSv2
- IEEE 802.1D - 1998 Spanning Tree Protocol (STP)
- IEEE 802.1D - 2004 Spanning Tree Protocol (STP and RSTP)
- IEEE 802.1w - 2001 Rapid Reconfiguration for STP, RSTP
- IEEE 802.1Q-2003 (formerly IEEE 802.1s) Multiple Instances of STP, MSTP
- EMISTP, Extreme Multiple Instances of Spanning Tree Protocol
- PVST+, Per VLAN STP (802.1Q interoperable)
- Extreme Standby Router Protocol (ESRP)
- IEEE 802.1Q - 1998 Virtual Bridged Local Area Networks
- IEEE 802.3ad Static load sharing configuration and LACP based dynamic configuration
- IEEE 802.1AB - LLDP Link Layer Discovery Protocol
- LLDP Media Endpoint Discovery (LLDP-MED), ANSI/TIA-1057, draft 08
- Extreme Discovery Protocol (EDP)
- Extreme Loop Recovery Protocol (ELRP)
- Extreme Link State Monitoring (ELSM)
- Software Redundant Ports
VLANs, vMANs + MAC-in-MAC
- IEEE 802.1Q VLAN Tagging
- IEEE 802.1v: VLAN classification by Protocol and Port
- Port-based VLANs
- Protocol-based VLANs
- Multiple STP domains per VLAN
- IEEE 802.1ad Virtual MANs (vMANs)
- IEEE 802.1ah/D1.2 MAC-in-MAC Provider Bridging
Quality of Service and Policies
- IEEE 802.1D - 1998 (802.1p) Packet Priority
- RFC 2474 DiffServ Precedence, including 8 queues/port
- RFC 2598 DiffServ Expedited Forwarding (EF)
- RFC 2597 DiffServ Assured Forwarding (AF)
- RFC 2475 DiffServ Core and Edge Router Functions
IPv4
- RFC 1812 Requirements for IP Version 4 Routers
- RFC 1519 CIDR
- RFC 1256 IPv4 ICMP Router Discovery (IRDP)
- RFC 1122 Host Requirements
- RFC 768 UDP
- RFC 791 IP
- RFC 792 ICMP
- RFC 793 TCP
- RFC 826 ARP
- RFC 894 IP over Ethernet
- RFC 1027 Proxy ARP
- RFC 2068 HTTP server ??Used for web-based Network Login
- RFC 2338 VRRP
- Static Unicast Routes
- Static Multicast Routes
- RFC 1058 RIP v1
- RFC 2453 RIP v2
- RFC 2328 OSPF v2 (including MD5 authentication)
- RFC 1587 OSPF NSSA Option
- RFC 1765 OSPF Database Overflow
- RFC 2370 OSPF Opaque LSA Option
- RFC 3623 OSPF Graceful Restart
- RFC 1112 IGMP v1
- RFC 2236 IGMP v2
- RFC 3376 IGMP v3
- IGMP v1/v2/v3 Snooping with Configurable Router Registration Forwarding
- IGMP Filters
- Static IGMP Membership
- Multicast VLAN Registration
- RFC 2362 PIM-SM
- RFC 3569, draft-ietf-ssm-arch-06.txt PIM-SSM PIM Source Specific Multicast
IPv6
- RFC 2460, Internet Protocol, Version 6 (IPv6) Specification
- RFC 2461, Neighbor Discovery for IP Version 6, (IPv6)
- RFC 2462, IPv6 Stateless Address Auto configuration - Router Requirements
- RFC 2463, Internet Control Message Protocol (ICMPv6) for the IPv6 Specification
- RFC 2464, Transmission of IPv6 Packets over Ethernet Networks
- RFC 2465, IPv6 MIB, General Group and Textual Conventions
- RFC 2466, MIB for ICMPv6
- RFC 1981, Path MTU Discovery for IPv6, August 1996 - Router requirements
- RFC 3513, Internet Protocol Version 6 (IPv6) Addressing Architecture
- RFC 3587, Global Unicast Address Format
- RFC 2710, IPv6 Multicast Listener Discovery v1 (MLDv1) Protocol
- RFC 3810, IPv6 Multicast Listener Discovery v2 (MLDv2) Protocol
- RFC 2080, RIPng
- RFC 2893, Configured Tunnels
- RFC 3056, 6to4
- Static Unicast routes for IPv6
- Telnet server over IPv6 transport
- SSH-2 server over IPv6 transport
- Ping over IPv6 transport
- Traceroute over IPv6 transport
Management and Traffic Analysis
- RFC 2030 SNTP, Simple Network Time Protocol v4
- RFC 854 Telnet client and server
- RFC 783 TFTP Protocol (revision 2)
- RFC 951, 1542 BootP
- RFC 2131 BOOTP/DHCP relay agent and DHCP server
- RFC 1591 DNS (client operation)
- RFC 1155 Structure of Mgmt Information (SMIv1)
- RFC 1157 SNMPv1
- RFC 1212, RFC 1213, RFC 1215 MIB-II, Ethernet-Like MIB & TRAPs
- RFC 1573 Evolution of Interface
- RFC 1650 Ethernet-Like MIB (update of RFC 1213 for SNMPv2)
- RFC 1901 - 1908 SNMP v2c, SMIv2 and Revised MIB-II
- RFC 2570 - 2575 SNMPv3, user based security, encryption and authentication
- RFC 2576 Coexistence between SNMP Version 1, Version 2 and Version 3
- RFC 1757 RMON 4 groups: Stats, History, Alarms and Events
- RFC 2021 RMON2 (probe configuration)
- RFC 2668 802.3 MAU MIB
- RFC 1643 Ethernet MIB
- RFC 1493 Bridge MIB
- RFC 1354 IPv4 Forwarding Table MIB
- RFC 2737 Entity MIB v2
- RFC 2233 Interface MIB
- RFC 3621 PoE-MIB (BlackDiamond 8800 only)
- RFC 1354 IP Forwarding Table MIB
- RFC 1724 RIPv2 MIB
- RFC 1850 OSPFv2 MIB
- RFC 1657 BGP-4 MIB
- Draft-ietf-idr-bgp4-mibv2-02.txt- ?Enhanced BGP-4 MIB
- draft-ietf-pim-mib-v2-o1.txt
- RFC 2787 VRRP MIB
- Draft-ietf-bridge-rstpmib-03.txt - Definitions of Managed Objects for Bridges
with Rapid Spanning Tree Protocol
- Secure Shell (SSH-2) client and server
- Secure Copy (SCP-2) client and server
- Secure FTP (SFTP) server
- IEEE 802.1ag/D4.1 L2 Ping and traceroute
- sFlow version 5
- Configuration logging
- Multiple Images, Multiple Configs
- BSD System Logging Protocol (SYSLOG), with Multiple Syslog Servers
-999 Local Messages (criticals stored across reboots)
-
ExtremeWare vendor MIBs (includes FDB, PoE, CPU, Memory MIBs) http://www.extremenetworks.com/services/documentation
Security
- Routing protocol MD5 authentication (see above)
- Secure Shell (SSH-2), Secure Copy (SCP-2) and SFTP client/server with encryption/authentication
(requires export controlled encryption module)
- SNMPv3 user based security, with encryption/ authentication (see above)
- RFC 1492 TACACS+
- RFC 2138 RADIUS Authentication
- RFC 2139 RADIUS Accounting
- RFC 3579 RADIUS EAP support for 802.1x
- RADIUS Per-command Authentication
- Access Profiles on All Routing Protocols
- Access Policies for Telnet/SSH-2/SCP-2
- Network Login - 802.1x, web and MAC-based mechanisms
- IEEE 802.1x ??2001 Port-Based Network Access Control for Network Login
- Multiple supplicants with multiple VLANs for Network Login (all modes)
- Fallback to local authentication database (MAC and Web-based methods)
- Guest VLAN for 802.1x
- RFC 1866 HTML - Used for web-based Network Login
- SSL/TLS transport- ?used for for web-based Network Login, (requires export controlled
encryption module)
- MAC Security - Lockdown and Limit
- IP Security - RFC 3046 DHCP Option 82 with port and VLAN ID
- IP Security - DHCP enforcement via Disable ARP Learning
- IP Security - Gratuitous ARP Protection
- IP Security - Trusted DHCP Server
- IP Security - DHCP Secured ARP / ARP Validation
- Layer 2/3/4 Access Control Lists (ACLs)
- CLEAR-Flow, threshold based alerts and actions
Denial of Service Protection:
- RFC 2267 Network Ingress Filtering
- RPF (Unicast Reverse Path Forwarding) Control via ACLs
-
Wire-speed ACLs
- Rate Limiting / Shaping by ACLs
- IP Broadcast Forwarding Control
- ICMP and IP-Option Response Control
- SYN attack protection
- CPU DoS Protection with traffic rate-limiting to management CPU
- Robust against common Network Attacks:
- CERT (http://www.cert.org)
- CA-2003-04: "SQL Slammer"
- CA-2002-36: "SSHredder"
- CA-2002-03: SNMP vulnerabilities
- CA-98-13: tcp-denial-of-service
- CA-98.01: smurf
- CA-97.28:Teardrop_Land -Teardrop and "LAND" attack
- CA-96.26: ping
- CA-96.21: tcp_syn_flooding
- CA-96.01: UDP_service_denial
- CA-95.01: IP_Spoofing_Attacks_and_Hijacked_ Terminal_Connections
- IP Options Attack
|
-Teardrop, boink, opentear, jolt2, newtear, nestea, syndrop, smurf, fraggle, papasmurf,
synk4, raped, winfreeze, ping-f, ping of death, pepsi5, Latierra,
Winnuke, Simping, Sping, Ascend, Stream, Land, Octopus
Core Protocols: only available on switches with Core-License capability:
- PIM-DM Draft IETF PIM Dense Mode draft-ietfidmr-pim-dm-05.txt, draft-ietf-pim-dm-new-v2-04.
txt
- RFC 2740, OSPF for IPv6
- RFC 1771 Border Gateway Protocol 4
- RFC 1965 Autonomous System Confederations for BGP
- RFC 2796 BGP Route Reflection (supersedes RFC 1966)
- RFC 1997 BGP Communities Attribute
- RFC 1745 BGP4/IDRP for IP - OSPF Interaction
- RFC 2385 TCP MD5 Authentication for BGPv4
- RFC 2439 BGP Route Flap Damping
- RFC 2842 Capabilities Advertisement with BGP-4
- RFC 2918 Route Refresh Capability for BGP-4
- draft-ietf-idr-restart-10.txt Graceful Restart Mechanism for BGP
- EAPSv2 Shared Ports - multiple interconnections between rings
MPLS: requires MPLS Feature Pack license
- RFC 2205 Reservation Protocol
- RFC 2961 RSVP Refresh Overhead Reduction Extensions
- RFC 3031 Multiprotocol Label Switching Architecture
- RFC 3032 MPLS Label Stack Encoding
- RFC 3036 LDP
- RFC 3209 RSVP-TE: Extensions to RSVP for LSP Tunnels
- RFC 3630 Traffic Engineering Extensions to OSPFv2
- draft-ietf-l2vpn-vpls-ldp-08
- draft-ietf-pwe3-control-protocol-17
- draft-ietf-pwe3-ethernet-encap-11
- draft-ietf-mpls-lsp-ping-13
- RFC 3811 Definitions of Textual Conventions (TCs) for Multiprotocol Label Switching
(MPLS) Management
- RFC 3812 Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Management
Information Base (MIB)
- RFC 3813 Multiprotocol Label Switching (MPLS) Label Switching Router (LSR) Management
Information Base (MIB)
- RFC 3815 Definitions of Managed Objects for the Multiprotocol Label Switching
(MPLS), Label Distribution Protocol (LDP)
- draft-ietf-pwe3-pw-mib-06
- draft-ietf-pwe3-pw-mpls-mib-07
- draft-ietf-pwe3-enet-mib-06
General Specifications
Switching Capacity
MSM and I/O Modules
- MSM-5: MSM modules contain both the control plane as well as the switch fabric
for the BlackDiamond 12804.
- GM-20XT: 20-port Gigabit Ethernet module. Each port can be used for 10/100/1000BASET
or mini-GBIC connectivity (requires mini-GBIC modules)
- GM-20T: 20-port 10/100/1000BASE-T Gigabit Ethernet module (RJ-45)
- XM-2X: 2-port 10G module. XENPAK modules required.
Power Supply Options
Both AC and DC power supplies are available
-
AC power supplies can run from 90-264 VAC, and deliver
-700W at 90V to 120V, or
-1200W at 200V to 240V
-
48V DC power supplies deliver 1200W of power
Physical Specifications
Dimensions
- Chassis: 17.5" high x 17.51" wide x 18.23??deep (44.45 cm x 44.5 cm
x 46.3 cm)
- MSM Module Dimensions: 1.63 "high x 15.26" wide x 15.25" deep
(4.1 cm x 38.8 cm x 38.7 cm)
- I/O Module Dimensions: 1.63??high x 15.26 "wide 15.25" deep (4.1 cm
x 38.8 cm x 38.7 cm)
Weight
- Empty Chassis: 65 lb (29.5 kg)
- Power Supply: 7 lb (3.2 kg)
- MSM-5 8.5 lb (3.9 kg)
- G20XT 8.5 lb (3.9 kg)
- G20T 7.5 lb (3.4 kg)
- XM-2X 7 lb (3.2 kg)
Power
- Chassis with Fan Trays: 45W, 48V, 1.0A (Heat Dissipation: 154 BTU)
- MSM-5: 185W, 48V, 3.3A (Heat Dissipation: 632 BTU)
- GM-20XT Module: 161W, 48V, 3.5A (Heat Dissipation: 549 BTU)
- GM-20T Module: 149W, 48V, 3.5A (Heat Dissipation: 509 BTU)
- XM-2X Module: 132W, 48V, 2.9A (Heat Dissipation: 450 BTU)
Regulatory/Safety Standards
North American Safety of ITE
- UL 60950-1:2003 1st Ed., Listed Device (U.S.)
- CSA 22.2#60950-1-03 1st Ed.(Canada)
- Complies with FCC 21CFR Chapter1, Subchapter J (U.S. Laser Safety)
- CDRH Letter of Approval (U.S. FDA Approval)
- IEEE 802.3af 6-2003 Environment A for PoE Applications
European Safety of ITE
- EN60950-1:2001
- EN 60825-1+A2:2001 (Lasers Safety)
- TUV-R GS Mark by German Notified Body
- 73/23/EEC Low Voltage Directive
International Safety of ITE
- CB Report & Certificate per IEC 609501:2001+All Country Deviations
- AS/NZX 3260 (Australia/New Zealand)
EMI/EMC Standards
North America EMC for ITE
- FCC CFR 47 part 15 Class A (USA)
- ICES-003 Class A (Canada)
- European EMC standards
- EN 55022:1998 Class A
- EN 55024:1998 Class A
- includes IEC 61000-4-2, 3, 4, 5, 6, 8, 11
- EN 61000-3-2,3 (Harmonics & Flicker)
- ETSI EN 300 386:2001 (EMC Telecommunications)
- 89/336/EEC EMC Directive
International EMC Certifications
- CISPR 22:1997 Class A (International Emissions)
- CISPR 24:1997 Class A (International Immunity)
- IEC/EN 61000-4-2 Electrostatic Discharge, 8kV Contact, 15kV Air, Criteria A
- IEC/EN 61000-4-3 Radiated Immunity 10V/m, Criteria A
- IEC/EN 61000-4-4 Transient Burst, 1kV, Criteria A
- IEC/EN 61000-4-5 Surge, 2kV, 4kV, Criteria A
- IEC/EN 61000-4-6 Conducted Immunity, 0.1580MHz, 10V/m unmod. RMS, Criteria A
- IEC/EN 61000-4-11 Power Dips & Interruptions, >30%, 25 periods, Criteria
C
Country Specific
- VCCI Class A (Japan Emissions)
- AS/NZS 3548 ACA (Australia Emissions)
- CNS 13438:1997 Class A (BSMI-Taiwan)
- NOM/NYCE (Mexico)
- MIC Mark, EMC Approval (Korea)
Environmental
- EN/ETSI 300 019-2-1 v2.1.2 ??Class 1.2 Storage
- EN/ETSI 300 019-2-2 v2.1.2 ??Class 2.3 Transportation
- EN/ETSI 300 019-2-3 v2.1.2 ??Class 3.1e Operational
- EN/ETSI 300 753 (1997-10) ??Acoustic Noise
- NEBS GR-63 Issue 2 ??Sound Pressure
- ASTM D3580 Random Vibration Unpackaged 1.5G
Warranty
- 1-year on Hardware
- 90-days on Software
|
|