Cisco 3560-48PS - Catalyst Switch Folleto - Página 3

Navegue en línea o descargue pdf Folleto para Interruptor Cisco 3560-48PS - Catalyst Switch. Cisco 3560-48PS - Catalyst Switch 8 páginas. Cisco catalyst 3560-48ts: product brochure
También para Cisco 3560-48PS - Catalyst Switch: Boletín de productos (5 páginas), Boletín de asistencia sobre productos (6 páginas), Especificaciones (3 páginas), Especificaciones técnicas (8 páginas), Boletín de asistencia sobre productos (4 páginas), Ficha de datos (23 páginas)

Cisco 3560-48PS - Catalyst Switch Folleto
All contents are Copyright © 1992–2006, 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
The Cisco Catalyst 3560 Series also delivers high-performance, hardware-based IP routing for
either unicast or multicast traffic. The Cisco Express Forwarding-based routing architecture allows
for very high-speed lookups while delivering the stability, performance, and scalability necessary
to meet the needs of future requirements. Implementing routed uplinks to the core will improve
network availability by enabling faster failover protection and simplifying the Spanning Tree
Protocol algorithm by terminating all Spanning Tree Protocol instances at the aggregator switch.
Additionally, routed uplinks allow better bandwidth utilization by implementing equal cost routing
(ECR) on the uplinks to perform load balancing. Routed uplinks optimize the utility of uplinks out
of the wiring closet by eliminating unnecessary broadcast data flows into the network backbone.
Private VLANs improve scalability and provide IP address management benefits and Layer 2
security by partitioning a regular VLAN domain into subdomains. Support for the IPv6 industry
standard in the Cisco Catalyst 3560 Series also alleviates address space problems.
Advanced Quality of Service
The Cisco Catalyst 3560 Series provides intelligent services to keep everything flowing smoothly.
Industry-leading mechanisms for marking, classifying, and scheduling deliver best-in-class
performance for data, voice, and video traffic-all at wire speed. Important features include Shaped
Round Robin scheduling and policing/rate limiting as well as innovations like Scavenger Traffic
Queuing functions. The IP Services license (formerly called the Enhanced Multilayer Image, or
EMI) provides a richer set of enterprise-class features, including advanced hardware-based IP
Unicast and IP Multicast routing as well as policy-based routing (PBR).
Enhanced Security
The Cisco Catalyst 3560 Series uses the following capabilities to protect sensitive data and
network resources from internal and external threats:
The Cisco Catalyst 3560 Series supports Network Admission Control (NAC), an industry
initiative sponsored by Cisco Systems
security-policy compliance on all devices seeking to access network computing resources,
thereby limiting damage from viruses and worms. Using NAC, organizations can provide
network access to endpoint devices such as PCs, personal digital assistants (PDAs), and
servers that are verified to be fully compliant with established security policy. NAC can also
identify noncompliant devices and deny them access, place them in a quarantined area, or
give them restricted access to computing resources.
Dynamic ARP Inspection and IP Source Guard are security features in the Cisco Catalyst
3560 Series that protect the network from certain man-in-the-middle attacks. Dynamic ARP
Inspection validates Address Resolution Protocol (ARP) packets in a network and ensures
that only valid ARP requests and responses are relayed. IP Source Guard restricts IP traffic
from untrusted sources.
VPN Routing/Forwarding Lite (VRF Lite) in the Cisco Catalyst 3560 Series helps enable
unique VPNs without additional equipment at the customer site.
The IEEE 802.1x standard supported by the Cisco Catalyst 3560 Series prevents
unauthorized clients from connecting to a LAN through publicly accessible ports unless
they are properly authenticated.
Cisco Identity Based Networking Services (IBNS) in the Catalyst 3560 Series prevents
unauthorized access and helps ensure that users receive only their designated privileges.
It provides the ability to dynamically administer granular levels of network access.
®
that uses the network infrastructure to enforce
Brochure
Page 3 of 8