D ATASH EET
Enterasys K-Series™
&LEXIBLE -ODULAR 3WITCH 7ITH 0REMIUM &EATURES /PTIMIZED FOR %DGE $EPLOYMENTS
6ERSATILE HIGH DENSITY EDGE SWITCHING WITH
mEXIBLE CONNECTIVITY AND POWER OPTIONS
REDUCES COST OF OWNERSHIP
!DVANCED AUTOMATED NETWORK PROVISIONING
MAXIMIZES THE EFlCIENCY AND RELIABILITY
OF SUPPORTING NEW )4 SERVICES SUCH AS
VIRTUALIZED DESKTOPS
)NTEGRATED VISIBILITY GRANULARITY AND CONTROL
DELIVERS SIGNIlCANT COST SAVINGS AND PREMIUM
SECURITY FOR MISSION CRITICAL NETWORKS
%ASY TO DEPLOY ACCESS CONTROLS AND PRIORITIZATION
PROVIDES MORE ROBUST LOCATION IDENTIlCATION
AND OVERALL MANAGEMENT CAPABILITIES INCLUDING
SUPPORT FOR hBRING YOUR OWN DEVICEv PROGRAMS
Product Overview
The Enterasys K-Series™ is the most cost-effective, flow-based switching solution in the industry.
Providing exceptional levels of automation, visibility and control at the network edge, these flexible,
modular switches significantly reduce operational costs while still offering premium features.
The K-Series is built upon the Enterasys CoreFlow2 custom ASIC. This cornerstone switching
technology provides greater visibility into critical business applications and the ability to enable
better controls to meet the Service Level Agreements (SLAs) demanded by the business.
Designed to address the challenges associated with a growing demand for access to new
applications and services, the K-Series protects businesses traffic and supports changing
operational needs. This includes the consumerization of IT and “bring your own device” programs
that require more robust location, identification, visibility and overall management capabilities.
The K-Series is uniquely suited to intelligently manage individual user, device and application
conversations, as well as to provide the visibility and management to troubleshoot connectivity
issues, locate devices, and ensure protection of corporate data.
Enterasys K-Series switches are available in the following form factors:
s SLOT CHASSIS OFFERING UP TO A MAXIMUM OF TRIPLESPEED EDGE PORTS AND 'B UPLINKS
s SLOT CHASSIS OFFERING UP TO A MAXIMUM OF TRIPLESPEED EDGE PORTS AND 'B PORTS
4HE +3ERIES SUPPORTS UP TO 'B UPLINKS INCLUDING FOUR ON THE FABRIC CARD AND 'B )/-S
The K-Series makes forwarding decisions and enforces security policies and roles while classifying/
PRIORITIZING TRAFlC AT WIRE SPEED !LL )/ MODULES PROVIDE THE HIGHEST 1UALITY OF 3ERVICE 1O3 FEATURES
for critical applications such as voice and HD video even during periods of high network traffic load
while also proactively preventing Denial of Service (DoS) attacks and malware propagation.
The K-Series implements an industry-leading, flow-based switching architecture to intelligently
manage individual user and application conversations — far beyond the capabilities of switches
that are limited to using VLANs, ACLs, and ports to implement role-based access controls. Users
are identified and roles are applied to ensure each individual user can access their business-critical
applications no matter where they connect to the network. K-Series policy rules combined with
deep packet inspection can intelligently sense and automatically respond to security threats while
improving reliability and quality of the user experience.
Benefits
Business Alignment
s %NSURES EACH ENDUSER RECEIVES THE
INFORMATION SERVICES AND APPLICATIONS
NEEDED TO ACHIEVE THEIR BUSINESS GOALS
THROUGH EXTENSIVE NETWORK VISIBILITY AND
CONTROL CAPABILITIES
s 'REEN AND EFlCIENT POWER SYSTEM
MODULARITY DRIVES DOWN POWER AND
COOLING COSTS BY PROVIDING OPTIMAL
INCREMENTAL POWER CONSUMPTION
s #ONSISTENT END USER EXPERIENCE AND
NETWORK PROTECTION BY EFFECTIVELY
ALLOCATING CRITICAL NETWORK SERVICES
WHILE BLOCKING SUSPICIOUS TRAFlC
Operational Efficiency
s (IGHDENSITY SMALL FORM FACTOR CHASSIS
PROVIDES UP TO PORTS WITH 'B UPLINKS IN A
STANDARD RACK SIGNIlCANTLY REDUCING
FOOTPRINT COSTS
s -ANAGEMENT AUTOMATION AND BUILT
IN RESILIENCY FEATURES DRIVE DOWN
OPERATIONAL COSTS AND MAXIMIZE UPTIME
s !UTOMATICALLY IDENTIlES AND PROVISIONS
NEW DEVICES AND SERVICES REDUCING )4
DEPLOYMENT TIME
Security
s 2EDUCES RISK AND SIMPLIlES NETWORK
ADMINISTRATION WITH BUILTIN NOT BOLTED
ON SECURITY
s 0ROTECTS BUSINESS TRAFlC FROM MALICIOUS
ATTACKS AND MAINTAINS INFORMATION
CONlDENTIALITY INTEGRITY AND AVAILABILITY
s %XTENDS NETWORK ACCESS CONTROL AND
SECURITY TO EXISTING EDGE SWITCHES
AND WIRELESS ACCESS POINTS MEETING
THE CHALLENGES ASSOCIATED WITH THE
CONSUMERIZATION OF )4
Support and Service
s )NDUSTRYLEADING CUSTOMER SATISFACTION
AND lRST CALL RESOLUTION RATES
There is nothing more important
than our customers.
A significant differentiator for the K-Series is the ability to collect
NetFlow data at wire-speed providing total visibility into network
resource consumption for users and applications. The K-Series joins the
S-Series as the only enterprise switches to support multi-user, multimethod authentication on every port — absolutely essential when you
have devices such as IP phones, computers, printers, copiers, security
cameras, badge readers, and virtual machines connected to the network.
These new modular edge switches deliver flexible connectivity, premium
features and integrated security that enable the network to quickly adapt
to changing business requirements.
Hardware-Based High Availability Features
The K-Series includes many standard high availability features. These
hardware-based high availability features allow the K-Series to be
DEPLOYED IN MISSION CRITICAL ENVIRONMENTS THAT REQUIRE AVAILABILITY
The K-Series supports the following hardware-based high availability
features:
s 0ASSIVE CHASSIS BACKPLANE
s (OT SWAPPABLE FAN TRAYS WITH MULTIPLE COOLING FANS
s (OT SWAPPABLE AND LOADSHARING POWER SUPPLIES
s -ULTIPLE !# INPUT CONNECTIONS FOR POWER CIRCUIT REDUNDANCY
s 5P TO GROUPS OF EIGHT %THERNET PORTS CAN BE GROUPED TOGETHER TO
CREATE A MULTILINK AGGREGATION GROUP ,!'
Distributed, Flow-Based Architecture
In order to ensure granular visibility and management of traffic without
sacrificing performance, the Enterasys K-Series deploys a flowbased architecture. This architecture ensures that when a specific
communications flow is being established between two end points, the
first packets in that communication are processed through the multilayer
CLASSIlCATION ENGINES IN THE SWITCH AND THE )/ FABRIC MODULE )N THIS
process, the role is identified, the applicable policies are determined,
the packets are inspected and the action is determined. After the
flow is identified, all subsequent packets associated with that flow
are automatically handled in the Enterasys ASICs without any further
processing. In this way the Enterasys K-Series is able to apply a very
granular level of control to each flow at full line rate.
Multi-User/Method Authentication and Policy
Authentication allows enterprise organizations to manage network access
and provide mobility to users and devices. It provides a way to know who
or what is connected to the network and where this connection is at any
time. The Enterasys K-Series has unique, industry leading capabilities
regarding types of simultaneous authentication methods. K-Series modules
can support multiple concurrent authentication techniques, including:
s 8 AUTHENTICATION
s -!# AUTHENTICATION WHICH IS A WAY TO AUTHENTICATE DEVICES ON THE
NETWORK USING THE -!# ADDRESS
s 7EBBASED AUTHENTICATION ALSO KNOWN AS 0ORT 7EB !UTHENTICATION
07! WHERE A USER NAME AND PASSWORD ARE SUPPLIED THROUGH A BROWSER
s #%0 ALSO KNOWN AS #ONVERGENCE %ND 0OINT WHERE MULTIPLE VENDORS
VoIP phones are identified and authenticated; this capability provides
great flexibility to enterprises looking to implement access control
mechanisms across their infrastructure
A significant additional feature of the K-Series is the capability to
support multi-user authentication. This allows multiple users and
devices to be connected to the same physical port and each user or
device to be authenticated individually using one of the multi-method
OPTIONS X -!# 07! OR #%0 4HE MAJOR BENElT OF MULTIUSER
authentication is to authorize multiple users, either using dynamic policy
or VLAN assignment for each authenticated user. In the case of dynamic
POLICY THIS IS CALLED -ULTI5SER 0OLICY -ULTIUSER PORT CAPACITIES WITH THE
+3ERIES ARE DETERMINED ON A PER PORT PER )/ MODULE AND PER MULTISLOT
system basis.
-ULTIUSER AUTHENTICATION AND POLICY CAN PROVIDE SIGNIlCANT BENElTS
to customers by extending security services to users connected to
unmanaged devices, third party switches/routers, VPN concentrators,
or wireless LAN access points at the edge of their network. Using
authentication provides security, priority, and bandwidth control while
PROTECTING EXISTING NETWORK INVESTMENTS 4HE +3ERIES SUPPORTS UP TO USERS PER PORT WITH A LICENSE OPTION FOR USERS PER PORT 4OTAL SYSTEM
CAPACITY SUPPORTS USERS ON THE + AND USERS ON THE +
Dynamic, Flow-Based Packet Classification
Another unique feature that separates the Enterasys K-Series from all
COMPETITIVE SWITCHES IS THE CAPABILITY TO PROVIDE 5SER"ASED -ULTILAYER
0ACKET #LASSIlCATION1O3 7ITH THE WIDE ARRAY OF NETWORK APPLICATIONS
USED ON NETWORKS TODAY TRADITIONAL -ULTILAYER 0ACKET #LASSIlCATION
by itself is not enough to guarantee the timely transport of businessCRITICAL APPLICATIONS )N THE +3ERIES 5SER"ASED -ULTILAYER 0ACKET
Classification allows traffic classification not just by packet type, but
also by the role of the user on the network and the assigned policy of
THAT USER 7ITH 5SER"ASED -ULTILAYER 0ACKET #LASSIlCATION PACKETS
can be classified based on unique identifiers like “All Users”, “User
'ROUPSv AND h)NDIVIDUAL 5SERv THUS ENSURING A MORE GRANULAR APPROACH
to managing and maintaining network confidentiality, integrity, and
availability.
Network Visibility From High Fidelity NetFlow
Network performance management and security capabilities via NetFlow
are available on Enterasys K-Series switch ports without slowing down
switching and routing performance or requiring the purchase of expensive
daughter cards for every module. Enterasys NetFlow tracks every packet
in every flow as opposed to more typical statistical sampling techniques
Page 2
or restrictive appliance-based implementations. The value of unsampled,
real-time NetFlow monitoring is the visibility into exactly what traffic is
traversing the network. If something abnormal occurs it will be captured
by NetFlow and appropriate action can be applied. Additionally, NetFlow
can be used for capacity planning, allowing the network manager to
monitor the traffic flows and volumes of traffic in the network and
understand where the network needs to be reconfigured or upgraded.
This saves time and money by enabling administrators to know when and
where upgrades might be needed.
Network Traffic Monitoring - Port Mirroring
Port mirroring is an integrated diagnostic tool for tracking network
performance and security that is especially useful for fending off network
intrusion and attacks. It is a low-cost alternative to network taps and
other solutions that may require additional hardware, disrupt normal
network operation, affect client applications or may introduce a new
point of failure into your network.
Port mirroring is highly scalable and easy to monitor . It is especially
convenient to use in networks where ports are scarce. Ports that can be
configured to participate in mirroring include physical ports, virtual ports
AND HOST PORTSˆ6,!. INTERFACES AND INTRUSION DETECTION PORTS 7ITH
this feature, analyzing bi-directional traffic and ensuring connectivity
between, for example, a departmental switch and its high speed uplink to
a backbone switch becomes simple and cost effective process.
K-Series port mirroring relationships can be set on inbound traffic,
OUTBOUND TRAFlC OR BOTH FOR UP TO PORT MIRRORS CONSISTING OF ONETOONE
one-to-many, many-to-one, IDS or policy mirrors.
&EATURE 3UMMARY
Multi-layer packet classification - enables the delivery
of critical applications to specific users via traffic
awareness and control
s 5SER PORT AND DEVICE ,EVEL ,AYER THROUGH PACKET CLASSIlCATION
s 1O3 MAPPING TO PRIORITY QUEUES P )0 4O3 $3#0 UP TO queues per port
s -ULTIPLE QUEUING MECHANISMS 301 7&1 722 AND (YBRID
s 'RANULAR 1O3RATE LIMITING
s 6,!. TO POLICY MAPPING
Switching/VLAN services - provides high performance
connectivity, aggregation, and rapid recovery services
s %XTENSIVE INDUSTRY STANDARDS COMPLIANCE )%%% AND )%4&
s )NBOUND AND OUTBOUND BANDWIDTH RATE CONTROL PER mOW
s 6,!. SERVICES SUPPORT
Security (User, Network and Management)
s 5SER SECURITY
!UTHENTICATION 8 -!# 07! AND #%0 -!# 3TATIC AND
Dynamic) port locking
-ULTIUSER AUTHENTICATIONPOLICIES
s .ETWORK SECURITY
-
Access Control Lists (ACL) – basic and extended
- Policy-based security services (examples: spoofing, unsupported
protocol access, intrusion prevention, DoS attacks limits)
s -ANAGEMENT 3ECURITY
3ECURE ACCESS TO THE +3ERIES VIA 33( 3.-0 V
Management, Control and Analysis – provide
streamlined tools for maintaining network availability
and health
s #ONlGURATION
,INK AGGREGATION )%%% AD
-ULTIPLE SPANNING TREES )%%% S
-
Industry-standard CLI and web management support
2APID RECONlGURATION OF SPANNING TREE )%%% W
-ULTIPLE lRMWARE IMAGES WITH EDITABLE CONlGURATION lLES
s 0ROVIDER "RIDGES )%%% AD 1IN1 2EADY
s &LOW SETUP THROTTLING
s .ETWORK !NALYSIS
3.-0 VVCV 2-/. GROUPS AND 3-/. RFC 6,!.
and Stats
-
Port/VLAN mirroring (one-to-one, one-to-many, many-to-many)
-
Unsampled NetFlow on every port with no impact on system
switching and routing performance
s $(#0 3ERVER
IP Routing - provides dynamic traffic optimization,
broadcast containment and efficient network resilience
s 3TANDARD ROUTING FEATURES INCLUDE STATIC ROUTES 2)0V 2)0NG AND
-ULTICAST ROUTING SUPPORT $6-20 )'-0 VVV 0OLICY "ASED
2OUTING AND 2OUTE -APS AND 6220
s ,ICENSED ROUTING FEATURES INCLUDE /30& VV 62& AND 0)-3-
s !UTOMATED SETUP AND RECONlGURATION
2EPLACEMENT )/ MODULE WILL AUTOMATICALLY INHERIT PREVIOUS
modules configuration
Page 3
&EATURE2ICH &UNCTIONALITY
Examples of additional functionality and features that are supported by
the Enterasys K-Series:
s .ET&LOW 0ROVIDES REALTIME VISIBILITY APPLICATION PROlLING AND
capacity planning
s ,,$0-%$ ,INK ,AYER $ISCOVERY 0ROTOCOL FOR -EDIA %NDPOINT
Devices enhances VoIP deployments
s &LOW 3ETUP 4HROTTLING &34 EFFECTIVELY PREEMPTS AND DEFENDS
against DoS attacks
s .ODE !LIAS ,OCATION !UTOMATICALLY TRACKS USER AND DEVICE LOCATION
and enhances network management productivity and fault isolation
s 0ORT 0ROTECTION 3UITE -AINTAIN NETWORK AVAILABILITY BY ENSURING GOOD
protocol and end station behavior
s &LEX%DGE 4ECHNOLOGY 0ROVIDES ADVANCED BANDWIDTH MANAGEMENT
and allocation for demanding access/edge devices
Flow Setup Throttling (FST) is a proactive feature designed to mitigate
zero-day threats and Denial of Service (DoS) attacks before they can
affect the network. FST directly combats the effects of zero-day and
DoS attacks by limiting the number of new or established flows that
can be programmed on any individual switch port. This is achieved by
monitoring the new flow arrival rate and/or controlling the maximum
number of allowable flows.
In network operations, it is very time consuming to locate a device or
find exactly where a user is connected. This is especially important when
reacting to security breaches. Enterasys K-Series modules automatically
track the network’s user/device location information by listening to
network traffic as it passes through the switch. This information is then
used to populate the Node/Alias table with information such as an
ENDSTATIONS -!# ADDRESS AND ,AYER ALIAS INFORMATION )0 ADDRESS
)08 ADDRESS ETC 4HIS INFORMATION CAN THEN BE UTILIZED BY %NTERASYS
.-3 3UITE MANAGEMENT TOOLS TO QUICKLY DETERMINE THE SWITCH AND PORT
number for any IP address and take action against that device in the
event of a security breach. This node and alias functionality is unique
to Enterasys and reduces the time to pinpoint the exact location of a
problem from hours to minutes.
For organizations looking to deploy Unified Communications, the
Enterasys K-Series combines policy-based automation with support for
MULTIPLE STANDARDSBASED DISCOVERY METHODS INCLUDING ,,$0-%$ 3)0
AND ( TO AUTOMATICALLY IDENTIFY AND PROVISION 5# SERVICES FOR )0
phones from all major vendors. K-Series switches also provide dynamic
mobility for IP clients; when an IP phone moves and plugs in elsewhere
in the enterprise network, its VoIP service provisioning, security and
traffic priority settings move with it, with none of the typical manual
administration required for moves, adds and changes.
The K-Series also supports a comprehensive portfolio of port protection
CAPABILITIES SUCH AS 30!.GUARD AND -!#,OCK WHICH PROVIDE THE
ABILITY TO DETECT UNAUTHORIZED BRIDGES IN THE NETWORK AND RESTRICT A -!#
ADDRESS TO A SPECIlC PORT /THER PORT PROTECTION FEATURES INCLUDE ,INK
Flap, Broadcast Suppression and Spanning Tree Loop protection which
protects against mis-configuration and protocol failure.
Enterasys K-Series Flex-Edge technology provides line rate traffic
classification for all access ports with guaranteed priority delivery for
control plane traffic and high-priority traffic as defined by the Enterasys
policy overlay. In addition to allocating resources for important network
traffic, prioritized bandwidth can be assigned on a per port or per
authenticated user basis. Flex-Edge technology is ideal for deployment in
wiring closets and distribution points that can often suffer from spikes in
UTILIZATION THAT CAUSE NETWORK CONGESTION 7ITH &LEX%DGE TECHNOLOGIES
organizations no longer have to fear a momentary network congestion
event that would result in topology changes and random packet discards.
Page 4
3TANDARDS AND 0ROTOCOLS
Switching/VLAN Services
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
'ENERIC 6,!. 2EGISTRATION 0ROTOCOL '620
U &AST %THERNET
AB 'IGABIT %THERNET COPPER
Z 'IGABIT %THERNET lBER
AE 'IGABIT %THERNET lBER
1 6,!.S
$ -!# "RIDGES
0ROVIDER "RIDGES )%%% AD 2EADY
W 2APID RECONVERGENCE OF 3PANNING
Tree
S -ULTIPLE 3PANNING 4REE
AD ,INK !GGREGATION
AE 'IGABIT %THERNET
X &LOW #ONTROL
)0 -ULTICAST )'-0 SUPPORT V V V PER
VLAN querier offload)
*UMBO 0ACKET WITH -45 $ISCOVERY 3UPPORT
FOR 'IGABIT
,INK &LAP $ETECTION
$YNAMIC %GRESS !UTOMATED 6,!. 0ORT
Configuration)
3AB ,,$0-%$
Standard IP Routing Features
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
3TATIC 2OUTES
3TANDARD !#,S
/30& WITH -ULTIPATH 3UPPORT
/30& 0ASSIVE )NTERFACES
)0V 2OUTING )0V 2OUTING #APABLE
%XTENDED !#,S
0OLICYBASED 2OUTING
2&# )#-0
2&# !20
2&# 0ROXY !20
2&# )'-0
2&# #)$2
2&# 2&# /30&V
2&# /30&V .33!
2&# /30& )NTERACTIONS
2&# /30& )NTERACTIONS
2&# /30& $ATABASE /VERmOW
$6-20 V
2&# 'ENERAL 2OUTING
2&# 3.40V FOR )0V )0V /3)
2&# 2)0)) -$ !UTHENTICATION
2&# )0 &ORWARDING 4ABLE -)"
2&# $(#0 3ERVER 2ELAY
2&# /30& WITH $IGITAL 3IGNATURES
2&# )'-0V
2&# /30&V
2&# /30& 3TANDARDIZATION 2EPORT
2&# 6220
2&# 0ROTOCOL )NDEPENDENT -ULTICAST 3PARSE -ODE
s 2&# !DDRESS NOTATION COMPRESSION
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
2&# 2)0V
2&# )0V 3PECIlCATION
2&# .EIGHBOR $ISCOVERY )0V
2&# )0V 3TATELESS !DDRESS
Autoconfiguration
2&# 4RANSMISSION OF )0V OVER
Ethernet
2&# $3 &IELD DElNITION IN )0VV
Headers
2&# -,$V
2&# )0V 2OUTER !LERT /PTION
2&# 2OUTER 2ENUMBERING
2&# /30& .33! /PTION
2&# /30& 3TUB 2OUTER !DVERTISEMENT
2&# )'-0V
2&# 3.-0 !RCHITECTURE FOR
-ANAGEMENT &RAMEWORKS
2&# -ESSAGE 0ROCESSING AND
$ISPATCHING FOR 3.-0
2&# 3.-0 !PPLICATIONS
2&# 3.-0 !RCHITECTURE FOR
-ANAGEMENT &RAMEWORKS
2&# -ESSAGE 0ROCESSING AND
$ISPATCHING FOR 3.-0
2&# 3.-0 !PPLICATIONS
2&# !NYCAST 20 USING 0)2&# !LTERNATIVE )MPLEMENTATIONS OF
/30& !"2S
2&# )0V !DDRESSING !RCHITECTURE
2&# -,$ -ULTICAST ,ISTENER $ISCOVERY
2&# !NYCAST 20 USING 0)- AND -3$0
2&# !LTERNATIVE )MPLEMENTATIONS OF
/30& !"2S
2&# )0V !DDRESSING !RCHITECTURE
2&# -,$ -ULTICAST ,ISTENER $ISCOVERY
2&# 4EXTUAL #ONVENTIONS FOR )0V
Flow Label
2&# 'RACEFUL /30& 2ESTART
2&# .ETWORK )NGRESS &ILTERING
2&# 6220
2&# -,$V
2&# )0V 3COPED !DDRESS !RCHITECTURE
2&# 'RACEFUL /30& 2ESTART
)MPLEMENTATION 2EPORT
2&# 0RIORITIZED 4REATMENT OF /30&V
Packets
2&# )0 6ERSION !DDRESSING
Architecture
2&# )'-0 3NOOPING
2&# !UTHENTICATION #ONlDENTIALITY
FOR /30&V
2&# 0)-32&# 0)-3- )%4& 0ROPOSED 3TD 2EQ
Analysis
2&# )'-0V AND -,$V
2&# 3OURCE3PECIlC -ULTICAST FOR )0
2&# 0)-33- IN 2&# !NYCAST20 5SING 0)-
s 2&# .EIGHBOR $ISCOVERY FOR )0V
s 2&# /!- &UNCTIONS ON %THERNET,IKE
Interfaces
s 2&# %XTENDED )#-0 -ULTI0ART
-ESSAGES
s 2&# "32 FOR 0)s 2&# 0)- -)"
s 2&# )'-0V-,$V-#!34 2OUTING
Protocol Interaction
s 2&# /30&V 'RACEFUL 2ESTART
s 2&# 0)- "OOTSTRAP 2OUTER -)"
s 2&# /30& /PAQUE ,3! /PTION
s 2&# /30& FOR )0V
s 2&# 6220 6ERSION Class of Service
s
s
s
s
3TRICT 0RIORITY 1UEUING
7EIGHTED &AIR 1UEUING WITH 3HAPING
4RANSMIT 1UEUES PER 0ORT
0ACKET #OUNT OR "ANDWIDTH BASED 2ATE
,IMITERS "ANDWIDTH 4HRESHOLDS BETWEEN +BPS AND 'BPS
s )0 4O3$3#0 -ARKING2EMARKING
s $ 0RIORITYTO4RANSMIT 1UEUE -APPING
Network Security and Policy
Management
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
8 0ORTBASED !UTHENTICATION
7EBBASED !UTHENTICATION
-!#BASED !UTHENTICATION
#ONVERGENCE %NDPOINT $ISCOVERY WITH
$YNAMIC 0OLICY -APPING
3IEMENS (&! #ISCO 6O)0 ( AND 3)0
-ULTIPLE !UTHENTICATION 4YPES PER 0ORT
Simultaneously
-ULTIPLE !UTHENTICATED USERS PER PORT WITH
unique policies per user/End System (VLAN
association independent)
2&# )%%% 2!$)53 5SAGE
'UIDELINES WITH 6,!. TO 0OLICY -APPING
7ORM 0REVENTION &LOW 3ET5P 4HROTTLING
"ROADCAST 3UPPRESSION
!20 3TORM 0REVENTION
-!#TO0ORT ,OCKING
3PAN 'UARD 3PANNING 4REE 0ROTECTION
"EHAVIORAL !NOMALY $ETECTION&LOW #OLLECTOR
(non-sampled Netflow)
3TATIC -ULTICAST 'ROUP 0ROVISIONING
-ULTICAST 'ROUP 3ENDER AND 2ECEIVER 0OLICY
Control
Management, Control and Analysis
s 3.-0 VVCV
s 7EBBASED -ANAGEMENT )NTERFACE
s )NDUSTRY #OMMON #OMMAND ,INE )NTERFACE
Page 5
3TANDARDS AND 0ROTOCOLS CONT
s -ULTIPLE 3OFTWARE )MAGE 3UPPORT WITH
2EVISION 2OLL "ACK
s -ULTICONlGURATION &ILE 3UPPORT
s %DITABLE 4EXTBASED #ONlGURATION &ILE
s #/- 0ORT "OOT 0ROM AND )MAGE $OWNLOAD
VIA :-/$%s 4ELNET 3ERVER AND #LIENT
s 3ECURE 3HELL 33(V 3ERVER AND #LIENT
s #ABLETRON $ISCOVERY 0ROTOCOL
s #ISCO $ISCOVERY 0ROTOCOL VV
s 3YSLOG
s &40 #LIENT
s 3IMPLE .ETWORK 4IME 0ROTOCOL 3.40
s .ETmOW VERSION AND VERSION s 2&# 2!$)53
s 2&# 2!$)53 !CCOUNTING
s 4!#!#3 FOR -ANAGEMENT !CCESS #ONTROL
s -ANAGEMENT 6,!.
s -ANY TO/NEPORT /NETO-ANY 0ORTS
6,!. -IRROR 3ESSIONS
IETF and IEEE MIB Support
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
2&# 2&# )0-)"
2&# "RIDGE -)"
2&# 23 -)"
2&# 2)0V -)"
2&# 4#0 -)"
2&# 5$0 -)"
2&# )0 &ORWARDING 4ABLE -)"
2&# 3.-0#OMMUNITY -)"
2&# 3.-0V 3-)
2&# 3.-0V4#
2&# 3-/. -)"
2&# P1 -)"
2&# %NTITY -)"
2&# 6220 -)"
2&# 2-/. -)"
2&# )& -)"
2&# )& )NVERTED 3TACK -)"
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
s
2&# 0HYSICAL 4OPOLOGY -)"
2&# 0)- -)" FOR )0V
2&# (# 2-/. -)"
2&# ).%4 !DDRESS -)"
2&# 3.-0 &RAMEWORK -)"
2&# 3.-0-0$ -)"
2&# 3.-0V !PPLICATIONS -)"
2&# 3.-0 5SER"ASED 3- -)"
2&# 3.-0 6IEW "ASED !#- -)"
2&# 3.-0V42&# 3.-0V -)"
2&# 3.-0 #OMMUNITY-)"
2&# 0OWER %THERNET -)"
2&# %THER,IKE -)"
2&# -!5 -)"
2&# -)" FOR THE 4RANSMISSION #ONTROL
Protocol (TCP)
2&# -)" 5$0
2&# %NTITY -)"
2&# "'0 -)"
2&# )0 &ORWARDING -)"
2&# -)" FOR )0
2&# $)3-!. -)"
2&# /30&V -)"
2&# -!5 -)"
2&# -)" FOR THE 4RANSMISSION #ONTROL
Protocol (TCP)
2&# -)" FOR THE 5SER $ATAGRAM
Protocol (UDP)
2&# -'-$34$ -)"
$RAFTIETFIDMRDVMRPV -)"
$RAFTIETFPIMSMVNEW -)"
3.-02%!2#( -)"
)!.!ADDRESSFAMILYNUMBERS -)"
)%%% 0!% -)"
)%%% ,!' -)"
2340 -)"
53- 4ARGET 4AG -)"
5 "RIDGE -)"
Enterasys Network Management
Suite
s
s
s
s
s
.-3 #ONSOLE
.-3 0OLICY -ANAGER
.-3 )NVENTORY -ANAGER
.-3 !UTOMATED 3ECURITY -ANAGER
.-3 .!# -ANAGER
Page 6
3PECIlCATIONS
K6
K10
Switching Fabric Bandwidth
'BPS
'BPS
Switching Throughput
-PPS -EASURED IN BYTE PACKETS
-PPS -EASURED IN BYTE PACKETS
2OUTING 4HROUGHPUT
-PPS -EASURED IN BYTE PACKETS
-PPS -EASURED IN BYTE PACKETS
Address Table Size
-!# !DDRESSES
-!# !DDRESSES
VLANs Supported
4RANSMIT 1UEUES
#LASSIlCATION 2ULES
CHASSIS
CHASSIS
#HASSIS $IMENSIONS ( X 7 X $
( CM v
7 CM v
$ CM v
5U
( CM CM v
7 CM vv
$ CM v
5
(OST -EMORY AND &LASH
'B $2! -" mASH MEMORY
'B $2! -" mASH MEMORY
/PERATING 4EMPERATURE
# TO # & TO &
# TO # & TO &
Storage Temperature
# TO # & TO &
# TO # & TO &
/PERATING (UMIDITY
TO RELATIVE HUMIDITY NONCONDENSING
TO RELATIVE HUMIDITY NONCONDENSING
0OWER 2EQUIREMENTS
TO 6!# ! OR TO 6!# ! TO (Z
TO 6!# OR TO 6!# TO (Z
System Power
s !UTOMATED OR MANUAL 0O% POWER DISTRIBUTION
s 0ERPORT ENABLEDISABLE POWER LEVEL PRIORITY SAFETY OVERLOAD
and short-circuit protection
s 3YSTEM POWER MONITOR
s 0O% 0OWER
7 PER POWER SUPPLY TO 6!# 7 -AX
7 PER POWER SUPPLY AT TO 6!# 7 -AX
s !UTOMATED OR MANUAL 0O% POWER DISTRIBUTION
s 0ERPORT ENABLEDISABLE POWER LEVEL PRIORITY SAFETY OVERLOAD
and short-circuit protection
s 3YSTEM POWER MONITOR
s 0O% 0OWER
7 PER POWER SUPPLY TO 6!# 7 -AX
7 PER POWER SUPPLY AT TO 6!# 7 -AX
Standards Compliance
s )%%% AF
s )%%% AT
s )%%% AF
s )%%% AT
Safety
5, &$! #&2 AND #!.#3!
# .O %. %. %. )%# %# ,OW 6OLTAGE $IRECTIVE
5, &$! #&2 AND #!.#3!
# .O %. %. %. )%# %# ,OW 6OLTAGE $IRECTIVE
Electromagnetic Compatibility
&## #&2 0ART #LASS ! )#%3 #LASS ! %.
#LASS ! %. %. %. !3.: #)302 #LASS ! 6##) 6 #.3 "3-)
%# %-# $IRECTIVE
&## #&2 0ART #LASS ! )#%3 #LASS ! %.
#LASS ! %. %. %. !3.: #)302 #LASS ! 6##) 6 #.3 "3-)
%# %-# $IRECTIVE
Environmental
%# 2O(3 $IRECTIVE %# 7%%% $IRECTIVE
-INISTRY OF )NFORMATION /RDER #HINA 2O(3
%# 2O(3 $IRECTIVE %# 7%%% $IRECTIVE
-INISTRY OF )NFORMATION /RDER #HINA 2O(3
Performance/Capacity
Physical Specifications
Environmental Specifications
Power over Ethernet Specifications
Agency and Standard Specifications
/RDERING )NFORMATION
Part Number
Description
K6 Chassis
+#HASSIS
+3ERIES 3LOT #HASSIS AND &AN 4RAY
+&!.
+ &AN 4RAY 3PARE
+-)$+)4
+ -ID-OUNT +IT
K10 Chassis
+#HASSIS
+3ERIES 3LOT #HASSIS AND &AN 4RAY
+&!.
+ &AN 4RAY 3PARE
+-)$+)4
+ -ID-OUNT +IT
Page 7
/RDERING )NFORMATION
Part Number
Description
Power Supplies and Accessories
+!#037
+3ERIES 0OWER 3UPPLY ! 6!# INPUT 7 SYSTEM 7 0/%
+0/%"!9
+3ERIES %XTERNAL "AY 0OWER 3HELF
+0/%"!92!),
-OUNTING +IT FOR +0/%"!9
+0/%#",-
+3ERIES 0O% 0OWER TO + #HASSIS #ABLE -
I/O Fabric Modules
++&
+ -ANAGEMENT&ABRIC -ODULE '" VIA 3&0
++&
+ -ANAGEMENT&ABRIC -ODULE '" VIA 3&0
I/O Modules
+4
+3ERIES 0ORT AT 0O% )/-
+'
+3ERIES 0ORT 'B 3&0 )/-
++
+3ERIES 0ORT 'B 3&0 )/-
Licenses
+%/3,
!DVANCED 2OUTING ,ICENSE /30& 62& 0)-3-
+%/300#
K-Series Per Port User Capacity License Upgrade
Transceivers
Service and Support
Enterasys transceivers provide connectivity options for Ethernet over
twisted pair copper and fiber optic cables with transmission speeds
FROM -EGABITS PER SECOND TO 'IGABITS PER SECOND !LL %NTERASYS
transceivers meet the highest quality for extended life cycle and the best
possible return on investment. For detailed specifications, compatibility
and ordering information please go to
HTTPWWWENTERASYSCOMPRODUCTSTRANSCEIVERSDSPDF
Enterasys Networks provides comprehensive service offerings that range
from Professional Services to design, deploy and optimize customer
networks, customized technical training, to service and support tailored
to individual customer needs. Please contact your Enterasys account
executive for more information about Enterasys Service and Support.
Warranty
The Enterasys K-Series comes with a one year hardware warranty.
For full warranty terms and conditions please go to
HTTPWWWENTERASYSCOMSUPPORTWARRANTYASPX
#ONTACT 5S
&OR MORE INFORMATION CALL %NTERASYS .ETWORKS TOLL FREE AT OR AND VISIT US ON THE 7EB AT ENTERASYSCOM
Patented Innovation
© 2011 Enterasys Networks, Inc. All rights reserved. Enterasys Networks reserves the right to change
specifications without notice. Please contact your representative to confirm current specifications.
Please visit http://www.enterasys.com/company/trademarks.aspx for trademark information.
03/11
Delivering on our promises. On-time. On-budget.