Cisco Catalyst 2955T WS-C2955T-12 Hoja De Datos

Los códigos de productos
WS-C2955T-12
Descargar
Página de 16
Cisco Systems, Inc.
All contents are Copyright © 1992–2003 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 2 of 16
Intelligence in the New Ethernet Networks
Currently, non-Ethernet Layer 2 networks are evolving from traditional fieldbuses or proprietary technologies to
standards-based Ethernet networks. The progression to Ethernet is driven by a multitude of factors, including:
• Standardization—There are hundreds of millions of Ethernet devices around the world; Ethernet has become the
prevalent Layer 2 technology based on widely adopted standards.
• IP Connectivity—Ethernet is the most ubiquitous Layer 2 technology for Internet connectivity, in turn providing
unprecedented communications potential to networks that have been traditionally isolated.
• Bandwidth—Orders of magnitude above other existing technologies, Ethernet takes advantage of the increased
computational power of the new network hosts (I/O devices, motion machinery, sensors, intelligent electronic
devices, etc.) being deployed today. This allows for real-time control and data gathering for a multitude of
applications that were not previously feasible, including preventive maintenance, total quality control
monitoring, remote monitoring, and asset management and optimization.
• Multiple services on a single infrastructure—Intelligent Ethernet allows a single network to carry multiple vendor
implementations of control [Ethernet/IP, Modbus TCP, Foundation Fieldbus High Speed Ethernet (HSE) and
various Advanced Traffic Management Systems (ATMS)], and to use the same investment to also deliver
traditional voice (telephony), data (e-mail, technical support, and browsing), and video services (video
monitoring).
• Multilayer integration—All of the elements described above allow for the integration of higher-level applications
such as enterprise resource planning (ERP), manufacturing execution systems (MES), and advanced traffic
management systems to the floor control layer (programmable logic controllers [PLCs], PC-based control
systems, traffic control equipment, and human-machine interfaces [HMIs]). This allows for a true flow of data
and automation from the demand side (customer placing and order) to the factory floor (assembly line) or from
the monitoring devices in a freeway all the way to the emergency response systems, as well as real-time control
in SCADA applications. As organizations increasingly rely on Ethernet networks, it is important to ensure high
availability, security, scalability, and control. By adding Cisco IOS Software functionality to new network
applications, users can now deploy network-wide intelligent services that address these requirements in a
consistent way—from the I/O or monitoring device to the core and through the WAN.
Network Security through Advanced Security Features
Cisco Catalyst 2955 Series switches offer enhanced data security through numerous security features. These features
allow customers to enhance network security with capabilities to secure traffic through the protection of passwords
and configuration information; to provide options for network security based on users, ports, and Media Access
Control (MAC) addresses; and to enable more immediate reactions to intruder and hacker detection.
Secure Shell (SSH) Protocol and SNMPv3 protect information from tampering or eavesdropping by encrypting
information being passed along the network, thereby guarding administrative information. Private VLAN Edge
isolates ports on a switch, ensuring that traffic travels directly from the entry point to the aggregation device through
a virtual path and cannot be directed to another port.
Port-based access control parameters (ACPs) restrict sensitive portions of the network by denying packets based on
source and destination MAC addresses, IP addresses, or Transmission Control Protocol/User Datagram Protocol
(TCP/UDP) ports. ACP lookups are done in hardware, so forwarding performance is not compromised when
implementing this type of security in the network. In addition, time-based ACPs allow configuration of differentiated