Cisco 3750 - Catalyst EMI Switch Faq - Strona 6

Przeglądaj online lub pobierz pdf Faq dla Przełącznik Cisco 3750 - Catalyst EMI Switch. Cisco 3750 - Catalyst EMI Switch 10 stron. Catalyst 3750 series switches
Również dla Cisco 3750 - Catalyst EMI Switch: Arkusz danych (18 strony), Instrukcje instalacji (47 strony), Biuletyn produktu (5 strony), Biuletyn wsparcia produktu (6 strony), Przegląd produktów (25 strony), Opis (1 strony), Arkusz danych (23 strony), Biuletyn wsparcia produktu (6 strony), Podręcznik dla początkujących (27 strony), Arkusz danych (23 strony), Podręcznik dla początkujących (33 strony)

Cisco 3750 - Catalyst EMI Switch Faq
Intelligent Switching
Q. Why do I need intelligence at the edge of my network?
A. Networks are evolving to address four new developments at the network edge:
• Increase in desktop computing power
• Introduction of bandwidth-intensive applications
• Expansion of highly sensitive data on the network
• Presence of multiple device types, such as IP phones and wireless LAN access points
These new demands are contending for resources with many existing mission-critical applications. As a result, IT
professionals must view the edge of the network as critical to effectively manage the delivery of information and
applications. As companies increasingly rely on networks as the strategic business infrastructure, it is more important
than ever to ensure their high availability, security, scalability, and control. By adding Cisco intelligent functions to
the wiring closet, customers can now deploy networkwide intelligent services that address these requirements in a
consistent way from the desktop to the core and through the WAN.
With Cisco Catalyst Intelligent Ethernet switches, Cisco helps companies to realize the full benefits of adding
intelligent services to their networks. Deploying capabilities that make the network infrastructure highly available to
accommodate time-critical needs, scalable to accommodate growth, secure enough to protect confidential
information, and capable of differentiating and controlling traffic flows are key to further optimizing network
operations.
Q. Can you provide more details on how Cisco intelligent switching will help my network?
A. New applications are requiring higher bandwidth and the need to differentiate and control the traffic flow.
Applications such as enterprise resource planning (ERP) (Oracle, SAP, etc.), voice (IP telephony traffic) and CAD/
CAM require prioritization over less time-sensitive applications such as FTP or Simple Mail Transfer Protocol
(SMTP). It would be highly undesirable to have a large file download destined to one port on a wiring closet switch
and have quality implications such as increased latency in voice traffic, destined to another port on this switch. This
condition is avoided by ensuring that voice traffic is properly classified and prioritized throughout the network. Cisco
Intelligent Ethernet switches implement superior QoS to ensure that network traffic is classified, prioritized, and
congestion is avoided.
Security
Q. How will the security needs of a network be handled?
A. With the rise in internal threats to a network, Cisco Ethernet switches enhance data security through a wide range
of features including Secure Shell (SSH) and Simple Network Management Protocol version 3 (SNMPv3) protocols,
ACLs, 802.1x, port security, private VLAN edge, Dynamic Host Configuration Protocol (DHCP) interface tracker,
MAC address notification, and RADIUS/TACACS+. Depending on your security needs, the Cisco Catalyst 3550
Series complements devices such as firewalls, VPNs, and Intrusion Detection Systems.
Q. For security purposes, how can I protect unauthorized users from accessing my network?
A. The Cisco Catalyst 3750 supports 802.1x that works in conjunction with a RADIUS server to authenticate users
as they access a network. The 802.1x standard is considered port-level security and is commonly used for wireless
LANs. Additionally, portions of the network can be restricted by using ACLs. Access can be denied based on Media
All contents are Copyright © 1992–2003 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Cisco Systems, Inc.
Page 6 of 10