Extreme networks Summit 300 15401 Dépliant
Codici prodotto
15401
www.extremenetworks.com
email: info@extremenetworks.com
Corporate Headquarters
and North America
Extreme Networks, Inc.
3585 Monroe Street,
Santa Clara, CA 95051 USA
Phone +1 408 579 2800
and North America
Extreme Networks, Inc.
3585 Monroe Street,
Santa Clara, CA 95051 USA
Phone +1 408 579 2800
Europe, Middle East, Africa
and South America
Phone +31 30 800 5100
and South America
Phone +31 30 800 5100
Asia Pacific
Phone +852 2517 1123
Phone +852 2517 1123
Japan
Phone +81 3 5842 4011
Phone +81 3 5842 4011
© 2005 Extreme Networks, Inc. All rights reserved.
Extreme Networks, the Extreme Networks Logo, AccessAdapt, Extreme Standby Routing Protocol, ExtremeWare, and Summit are either
registered trademarks or trademarks of Extreme Networks, Inc. in the United States and/or other countries.
Specifications are subject to change without notice.
Extreme Networks, the Extreme Networks Logo, AccessAdapt, Extreme Standby Routing Protocol, ExtremeWare, and Summit are either
registered trademarks or trademarks of Extreme Networks, Inc. in the United States and/or other countries.
Specifications are subject to change without notice.
1053_01 11/05
Summit 300 Series Product Brief
Extreme Networks Product Brief
Voice-Class Availability at the
Edge of the Network
Redundant copper and fiber gigabit
uplinks, dual-homed configurations, and
sub-second EAPS failover provide mission-
critical resiliency. The Summit 300 delivers
advanced high availability features
traditionally reserved for carrier networks.
Ethernet Automatic Protection Switching
(EAPS, RFC 3619) delivers sub-second
(less than 50ms recovery) protection
switching to interconnected switches in
an Ethernet ring topology. Similar to the
Spanning Tree Protocol (STP), EAPS
offers the advantage of converging in
significantly less time than STP or even
Rapid Spanning Tree (802.1w) when a
link breaks in the ring. Extreme Standby
Routing Protocol™ (ESRP) can be
implemented at both Layers 2 and 3 and
extends the Virtual Router Redundancy
Protocol’s (VRRP) capabilities, adding
Layer 2 resiliency and loop prevention
and Layer 3 default router redundancy.
It can be used as a STP substitute and
can be scaled to protect thousands of
VLANs. Multiple instances of ESRP in the
same VLAN allow direct host attachment
to standby switches.
uplinks, dual-homed configurations, and
sub-second EAPS failover provide mission-
critical resiliency. The Summit 300 delivers
advanced high availability features
traditionally reserved for carrier networks.
Ethernet Automatic Protection Switching
(EAPS, RFC 3619) delivers sub-second
(less than 50ms recovery) protection
switching to interconnected switches in
an Ethernet ring topology. Similar to the
Spanning Tree Protocol (STP), EAPS
offers the advantage of converging in
significantly less time than STP or even
Rapid Spanning Tree (802.1w) when a
link breaks in the ring. Extreme Standby
Routing Protocol™ (ESRP) can be
implemented at both Layers 2 and 3 and
extends the Virtual Router Redundancy
Protocol’s (VRRP) capabilities, adding
Layer 2 resiliency and loop prevention
and Layer 3 default router redundancy.
It can be used as a STP substitute and
can be scaled to protect thousands of
VLANs. Multiple instances of ESRP in the
same VLAN allow direct host attachment
to standby switches.
High-Performance with QoS
for Converged Applications
The Summit 300 series offers a number of
features that improve the performance of
the network, such as RIP, OSPF, Network
Address Translation, QoS classification,
dynamic VLANs, and Access Control
Lists. For converged applications involving
voice or rich media, the switch provides
multicast, re-writing 802.1p tag prioriti-
zation, or prioritization using Layers 2 – 4.
Four hardware queues per 10/100 port
provide granularity and guarantee low
latency and low jitter for time-sensitive
voice and multi-media applications. These
applications also benefit from features
such as DiffServ and 802.1p which deliver
varied levels of service and ensure efficient
bandwidth usage.
features that improve the performance of
the network, such as RIP, OSPF, Network
Address Translation, QoS classification,
dynamic VLANs, and Access Control
Lists. For converged applications involving
voice or rich media, the switch provides
multicast, re-writing 802.1p tag prioriti-
zation, or prioritization using Layers 2 – 4.
Four hardware queues per 10/100 port
provide granularity and guarantee low
latency and low jitter for time-sensitive
voice and multi-media applications. These
applications also benefit from features
such as DiffServ and 802.1p which deliver
varied levels of service and ensure efficient
bandwidth usage.
Layer 3 Intelligence and
Comprehensive Security at
the Edge of the Network
Enterprise networks need both Layer 2
and Layer 3 intelligent services at the edge
to ensure maximum network efficiency.
Intelligence supports critical functionality
such as security to prevent unauthorized
access, high availability to ensure network
uptime, and common management to
reduce expenses.
and Layer 3 intelligent services at the edge
to ensure maximum network efficiency.
Intelligence supports critical functionality
such as security to prevent unauthorized
access, high availability to ensure network
uptime, and common management to
reduce expenses.
Security is a paramount concern in today’s
converged networks. ExtremeWare
supports multiple authentication options
including 802.1x, web-based login with
SSL, and MAC address. With IEEE 802.1x
login, network managers can always
control who is accessing and connected
to the network. Web-based Network
Login offers the freedom of authenticat-
ing through any HTTP-compliant web
browser. MAC address security prevents
converged networks. ExtremeWare
supports multiple authentication options
including 802.1x, web-based login with
SSL, and MAC address. With IEEE 802.1x
login, network managers can always
control who is accessing and connected
to the network. Web-based Network
Login offers the freedom of authenticat-
ing through any HTTP-compliant web
browser. MAC address security prevents
unauthorized port abuse from rogue
wireless APs or hubs/switches on edge
ports. Port abuse can be reduced using
lockdown on a per port basis and/or
limiting of the number of MAC addresses
learned by a port. Limiting the number of
MAC addresses learned on a port also
allows enforcement of service level
agreements in tenant or service provider
environments. MAC address security can
also be used in conjunction with a
RADIUS server to allow devices such as
bar code readers that do not support
802.1x to enter the network based on
their MAC address.
wireless APs or hubs/switches on edge
ports. Port abuse can be reduced using
lockdown on a per port basis and/or
limiting of the number of MAC addresses
learned by a port. Limiting the number of
MAC addresses learned on a port also
allows enforcement of service level
agreements in tenant or service provider
environments. MAC address security can
also be used in conjunction with a
RADIUS server to allow devices such as
bar code readers that do not support
802.1x to enter the network based on
their MAC address.
AccessAdapt technology provides
centralized configuration and software
delivery to Altitude 300 wireless ports.
Altitude 300 APs receive their personal-
ity from the switch. This simplifies
management and enables secure moves
or changes to APs.
centralized configuration and software
delivery to Altitude 300 wireless ports.
Altitude 300 APs receive their personal-
ity from the switch. This simplifies
management and enables secure moves
or changes to APs.
Features
Summit 300
Voice-Class Availability at the Network Edge
Dual homed Gigabit Ethernet uplinks
Dynamically route around network problems
Redundant uplinks
Sub-second failover on every port
ESRP, VRRP redundancy
Dual homed Gigabit Ethernet uplinks
Dynamically route around network problems
Redundant uplinks
Sub-second failover on every port
ESRP, VRRP redundancy
High-Performance with QoS for Converged Applications
Wireless LAN uses integrated security and
Wireless LAN uses integrated security and
management approach
Priority queues
802.1p priority marking
802.3af compliant PoE support on all ports
Priority queues
802.1p priority marking
802.3af compliant PoE support on all ports
Security
Network Login
802.1x
Web-based Network Login
SSH2
ACLs
Network Login
802.1x
Web-based Network Login
SSH2
ACLs
Intelligence at the Edge
Prioritize using Layer 2 - Layer 4 information
OSPF
Multicast
Network address translation
Prioritize using Layer 2 - Layer 4 information
OSPF
Multicast
Network address translation
Yes
Yes
Yes
Yes
Yes
Yes (EAPS)
Yes
Yes
4
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes, Layer 2 - Layer 4
Yes
Yes
Yes
Yes
Yes
Yes
Yes