Allied Telesis AT-IX5-28GPX Productinformatie - Pagina 2
Blader online of download pdf Productinformatie voor {categorie_naam} Allied Telesis AT-IX5-28GPX. Allied Telesis AT-IX5-28GPX 7 pagina's. High availability video surveillance switch
IX5-28GPX
| High Availability Video Surveillance Switch
Key Features
Reliable
» Dual hot-swappable load-sharing power supplies
maximize network uptime, ensuring a resilient
solution where always-on access is required.
Allied Telesis Management Framework (AMF)
» Allied Telesis Management Framework (AMF) is a
sophisticated suite of management tools that provide
a simplified approach to network management.
Common tasks are automated or made so simple that
you can achieve the every-day running of a network
without the need for highly-trained, and expensive,
network engineers. Powerful features like centralized
management, auto-backup, auto-upgrade, auto-
provisioning and auto-recovery enable plug-and-play
networking and zero-touch management.
VCStack
( Virtual Chassis Stacking)
TM
» Create a VCStack of up to four IX5 units with 40Gbps
of stacking bandwidth to each unit. VCStack provides
a highly available system where network resources
are spread out across stacked units, reducing the
impact if one of the units fails. Aggregating switch
ports on different units across the stack provides
excellent network resiliency.
Long-distance Stacking
» Long-distance stacking allows a VCStack to
be created over longer distances, perfect for a
distributed network environment.
EPSRing
(Ethernet Protection Switched Ring)
TM
» EPSRing and 10 Gigabit Ethernet allow several IX5
switches to form a high-speed protected ring capable
of recovery within as little as 50ms. This feature is
ideal for large IP surveillance environments.
» Super-Loop Protection enables a link between
two EPSR nodes to be in separate EPSR domains,
improving redundancy and network fault resiliency.
Industry-leading Quality of Service (QoS)
» Comprehensive low-latency wire speed QoS provides
flow-based traffic management with full classification,
prioritization, traffic shaping and min/max bandwidth
profiles. Boosted network performance and
guaranteed delivery of business-critical Ethernet
services and applications are provided. Time-critical
services such as voice and video take precedence
over non-essential services such as file downloads,
maintaining responsiveness of Enterprise applications.
2 | IX5-28GPX
Loop Protection
» Thrash limiting, also known as rapid MAC movement,
detects and resolves network loops. It is highly
user-configurable — from the rate of looping traffic
to the type of action the switch should take when it
detects a loop.
» With thrash limiting, the switch only detects a loop
when a storm has occurred, which can potentially
cause disruption to the network. To avoid this, loop
detection works in conjunction with thrash limiting
to send special Loop Detection Frame (LDF) packets
that the switch listens for. If a port receives an LDF
packet, you can choose to disable the port, disable
the link, or send an SNMP trap. This feature can
help to detect loops before a network storm occurs,
avoiding the risk and inconvenience of traffic
disruption.
Power over Ethernet Plus (PoE+)
» With PoE, a separate power connection to media
endpoints such as IP phones and wireless access
points is not necessary. PoE+ reduces costs and
provides even greater flexibility, providing the
capability to connect devices requiring more power
(up to 30 Watts) such as, tilt and zoom security
cameras.
Link Layer Discovery Protocol – Media
Endpoint Discovery (LLDP – MED)
» LLDP-MED extends LLDP basic network endpoint
discovery and management functions. LLDP-MED
allows for media endpoint specific messages,
providing detailed information on power requirements,
network policy, location discovery (for Emergency Call
Services) and inventory.
Voice VLAN
» Voice VLAN automatically separates voice and data
traffic into two different VLANs. This automatic
separation places delay-sensitive traffic into a voice-
dedicated VLAN, which simplifies QoS configurations.
sFlow
» sFlow is an industry-standard technology for
monitoring high-speed switched networks. It provides
complete visibility into network use, enabling
performance optimization, usage accounting/billing,
and defense against security threats. Sampled
packets sent to a collector ensure it always has a
real-time view of network traffic.
Dynamic Host Configuration Protocol (DHCP)
Snooping
» DHCP servers allocate IP addresses to clients, and
the switch keeps a record of addresses issued on
each port. IP source guard checks against this DHCP
snooping database to ensure only clients with specific
IP and/or MAC address can access the network.
DHCP snooping can be combined with other features,
like dynamic ARP inspection, to increase security in
Layer 2 switched environments, and also provides
a traceable history, which meets the growing legal
requirements placed on service providers.
Tri-authentication
» Authentication options on the IX5 also include
alternatives to IEEE 802.1x port-based authentication,
such as web authentication to enable guest access
and MAC authentication for endpoints that do
not have an IEEE 802.1x supplicant. All three
authentication methods—IEEE 802.1x, MAC-based
and Web-based—can be enabled simultaneously on
the same port for tri-authentication.
Access Control Lists (ACLs)
» AlliedWare Plus delivers industry-standard Access
Control functionality through ACLs. ACLs filter
network traffic to control whether routed packets
are forwarded or blocked at the port interface. This
provides a powerful network security mechanism to
select the types of traffic to be analyzed, forwarded,
or influenced in some way.
Terminal Access Controller Access–Control
System Plus (TACACS+) Authentication and
Accounting
» TACACS+ provides access control for network users
from a centralized server. Authentication is carried
out via communication between the local switch and
a TACACS+ server to check the credentials of users
seeking network access. Accounting keeps a record
of commands entered during user sessions to ensure
a secure network and clear audit trail.