D ATASH EET Enterasys K-Series™ &LEXIBLE -ODULAR 3WITCH 7ITH 0REMIUM &EATURES /PTIMIZED FOR %DGE $EPLOYMENTS 6ERSATILE HIGH DENSITY EDGE SWITCHING WITH mEXIBLE CONNECTIVITY AND POWER OPTIONS REDUCES COST OF OWNERSHIP !DVANCED AUTOMATED NETWORK PROVISIONING MAXIMIZES THE EFlCIENCY AND RELIABILITY OF SUPPORTING NEW )4 SERVICES SUCH AS VIRTUALIZED DESKTOPS )NTEGRATED VISIBILITY GRANULARITY AND CONTROL DELIVERS SIGNIlCANT COST SAVINGS AND PREMIUM SECURITY FOR MISSION CRITICAL NETWORKS %ASY TO DEPLOY ACCESS CONTROLS AND PRIORITIZATION PROVIDES MORE ROBUST LOCATION IDENTIlCATION AND OVERALL MANAGEMENT CAPABILITIES INCLUDING SUPPORT FOR hBRING YOUR OWN DEVICEv PROGRAMS Product Overview The Enterasys K-Series™ is the most cost-effective, flow-based switching solution in the industry. Providing exceptional levels of automation, visibility and control at the network edge, these flexible, modular switches significantly reduce operational costs while still offering premium features. The K-Series is built upon the Enterasys CoreFlow2 custom ASIC. This cornerstone switching technology provides greater visibility into critical business applications and the ability to enable better controls to meet the Service Level Agreements (SLAs) demanded by the business. Designed to address the challenges associated with a growing demand for access to new applications and services, the K-Series protects businesses traffic and supports changing operational needs. This includes the consumerization of IT and “bring your own device” programs that require more robust location, identification, visibility and overall management capabilities. The K-Series is uniquely suited to intelligently manage individual user, device and application conversations, as well as to provide the visibility and management to troubleshoot connectivity issues, locate devices, and ensure protection of corporate data. Enterasys K-Series switches are available in the following form factors: s SLOT CHASSIS OFFERING UP TO A MAXIMUM OF TRIPLESPEED EDGE PORTS AND 'B UPLINKS s SLOT CHASSIS OFFERING UP TO A MAXIMUM OF TRIPLESPEED EDGE PORTS AND 'B PORTS 4HE +3ERIES SUPPORTS UP TO 'B UPLINKS INCLUDING FOUR ON THE FABRIC CARD AND 'B )/-S The K-Series makes forwarding decisions and enforces security policies and roles while classifying/ PRIORITIZING TRAFlC AT WIRE SPEED !LL )/ MODULES PROVIDE THE HIGHEST 1UALITY OF 3ERVICE 1O3 FEATURES for critical applications such as voice and HD video even during periods of high network traffic load while also proactively preventing Denial of Service (DoS) attacks and malware propagation. The K-Series implements an industry-leading, flow-based switching architecture to intelligently manage individual user and application conversations — far beyond the capabilities of switches that are limited to using VLANs, ACLs, and ports to implement role-based access controls. Users are identified and roles are applied to ensure each individual user can access their business-critical applications no matter where they connect to the network. K-Series policy rules combined with deep packet inspection can intelligently sense and automatically respond to security threats while improving reliability and quality of the user experience. Benefits Business Alignment s %NSURES EACH ENDUSER RECEIVES THE INFORMATION SERVICES AND APPLICATIONS NEEDED TO ACHIEVE THEIR BUSINESS GOALS THROUGH EXTENSIVE NETWORK VISIBILITY AND CONTROL CAPABILITIES s 'REEN AND EFlCIENT POWER SYSTEM MODULARITY DRIVES DOWN POWER AND COOLING COSTS BY PROVIDING OPTIMAL INCREMENTAL POWER CONSUMPTION s #ONSISTENT END USER EXPERIENCE AND NETWORK PROTECTION BY EFFECTIVELY ALLOCATING CRITICAL NETWORK SERVICES WHILE BLOCKING SUSPICIOUS TRAFlC Operational Efficiency s (IGHDENSITY SMALL FORM FACTOR CHASSIS PROVIDES UP TO PORTS WITH 'B UPLINKS IN A STANDARD RACK SIGNIlCANTLY REDUCING FOOTPRINT COSTS s -ANAGEMENT AUTOMATION AND BUILT IN RESILIENCY FEATURES DRIVE DOWN OPERATIONAL COSTS AND MAXIMIZE UPTIME s !UTOMATICALLY IDENTIlES AND PROVISIONS NEW DEVICES AND SERVICES REDUCING )4 DEPLOYMENT TIME Security s 2EDUCES RISK AND SIMPLIlES NETWORK ADMINISTRATION WITH BUILTIN NOT BOLTED ON SECURITY s 0ROTECTS BUSINESS TRAFlC FROM MALICIOUS ATTACKS AND MAINTAINS INFORMATION CONlDENTIALITY INTEGRITY AND AVAILABILITY s %XTENDS NETWORK ACCESS CONTROL AND SECURITY TO EXISTING EDGE SWITCHES AND WIRELESS ACCESS POINTS MEETING THE CHALLENGES ASSOCIATED WITH THE CONSUMERIZATION OF )4 Support and Service s )NDUSTRYLEADING CUSTOMER SATISFACTION AND lRST CALL RESOLUTION RATES There is nothing more important than our customers. A significant differentiator for the K-Series is the ability to collect NetFlow data at wire-speed providing total visibility into network resource consumption for users and applications. The K-Series joins the S-Series as the only enterprise switches to support multi-user, multimethod authentication on every port — absolutely essential when you have devices such as IP phones, computers, printers, copiers, security cameras, badge readers, and virtual machines connected to the network. These new modular edge switches deliver flexible connectivity, premium features and integrated security that enable the network to quickly adapt to changing business requirements. Hardware-Based High Availability Features The K-Series includes many standard high availability features. These hardware-based high availability features allow the K-Series to be DEPLOYED IN MISSION CRITICAL ENVIRONMENTS THAT REQUIRE AVAILABILITY The K-Series supports the following hardware-based high availability features: s 0ASSIVE CHASSIS BACKPLANE s (OT SWAPPABLE FAN TRAYS WITH MULTIPLE COOLING FANS s (OT SWAPPABLE AND LOADSHARING POWER SUPPLIES s -ULTIPLE !# INPUT CONNECTIONS FOR POWER CIRCUIT REDUNDANCY s 5P TO GROUPS OF EIGHT %THERNET PORTS CAN BE GROUPED TOGETHER TO CREATE A MULTILINK AGGREGATION GROUP ,!' Distributed, Flow-Based Architecture In order to ensure granular visibility and management of traffic without sacrificing performance, the Enterasys K-Series deploys a flowbased architecture. This architecture ensures that when a specific communications flow is being established between two end points, the first packets in that communication are processed through the multilayer CLASSIlCATION ENGINES IN THE SWITCH AND THE )/ FABRIC MODULE )N THIS process, the role is identified, the applicable policies are determined, the packets are inspected and the action is determined. After the flow is identified, all subsequent packets associated with that flow are automatically handled in the Enterasys ASICs without any further processing. In this way the Enterasys K-Series is able to apply a very granular level of control to each flow at full line rate. Multi-User/Method Authentication and Policy Authentication allows enterprise organizations to manage network access and provide mobility to users and devices. It provides a way to know who or what is connected to the network and where this connection is at any time. The Enterasys K-Series has unique, industry leading capabilities regarding types of simultaneous authentication methods. K-Series modules can support multiple concurrent authentication techniques, including: s 8 AUTHENTICATION s -!# AUTHENTICATION WHICH IS A WAY TO AUTHENTICATE DEVICES ON THE NETWORK USING THE -!# ADDRESS s 7EBBASED AUTHENTICATION ALSO KNOWN AS 0ORT 7EB !UTHENTICATION 07! WHERE A USER NAME AND PASSWORD ARE SUPPLIED THROUGH A BROWSER s #%0 ALSO KNOWN AS #ONVERGENCE %ND 0OINT WHERE MULTIPLE VENDORS VoIP phones are identified and authenticated; this capability provides great flexibility to enterprises looking to implement access control mechanisms across their infrastructure A significant additional feature of the K-Series is the capability to support multi-user authentication. This allows multiple users and devices to be connected to the same physical port and each user or device to be authenticated individually using one of the multi-method OPTIONS X -!# 07! OR #%0 4HE MAJOR BENElT OF MULTIUSER authentication is to authorize multiple users, either using dynamic policy or VLAN assignment for each authenticated user. In the case of dynamic POLICY THIS IS CALLED -ULTI5SER 0OLICY -ULTIUSER PORT CAPACITIES WITH THE +3ERIES ARE DETERMINED ON A PER PORT PER )/ MODULE AND PER MULTISLOT system basis. -ULTIUSER AUTHENTICATION AND POLICY CAN PROVIDE SIGNIlCANT BENElTS to customers by extending security services to users connected to unmanaged devices, third party switches/routers, VPN concentrators, or wireless LAN access points at the edge of their network. Using authentication provides security, priority, and bandwidth control while PROTECTING EXISTING NETWORK INVESTMENTS 4HE +3ERIES SUPPORTS UP TO USERS PER PORT WITH A LICENSE OPTION FOR USERS PER PORT 4OTAL SYSTEM CAPACITY SUPPORTS USERS ON THE + AND USERS ON THE + Dynamic, Flow-Based Packet Classification Another unique feature that separates the Enterasys K-Series from all COMPETITIVE SWITCHES IS THE CAPABILITY TO PROVIDE 5SER"ASED -ULTILAYER 0ACKET #LASSIlCATION1O3 7ITH THE WIDE ARRAY OF NETWORK APPLICATIONS USED ON NETWORKS TODAY TRADITIONAL -ULTILAYER 0ACKET #LASSIlCATION by itself is not enough to guarantee the timely transport of businessCRITICAL APPLICATIONS )N THE +3ERIES 5SER"ASED -ULTILAYER 0ACKET Classification allows traffic classification not just by packet type, but also by the role of the user on the network and the assigned policy of THAT USER 7ITH 5SER"ASED -ULTILAYER 0ACKET #LASSIlCATION PACKETS can be classified based on unique identifiers like “All Users”, “User 'ROUPSv AND h)NDIVIDUAL 5SERv THUS ENSURING A MORE GRANULAR APPROACH to managing and maintaining network confidentiality, integrity, and availability. Network Visibility From High Fidelity NetFlow Network performance management and security capabilities via NetFlow are available on Enterasys K-Series switch ports without slowing down switching and routing performance or requiring the purchase of expensive daughter cards for every module. Enterasys NetFlow tracks every packet in every flow as opposed to more typical statistical sampling techniques Page 2 or restrictive appliance-based implementations. The value of unsampled, real-time NetFlow monitoring is the visibility into exactly what traffic is traversing the network. If something abnormal occurs it will be captured by NetFlow and appropriate action can be applied. Additionally, NetFlow can be used for capacity planning, allowing the network manager to monitor the traffic flows and volumes of traffic in the network and understand where the network needs to be reconfigured or upgraded. This saves time and money by enabling administrators to know when and where upgrades might be needed. Network Traffic Monitoring - Port Mirroring Port mirroring is an integrated diagnostic tool for tracking network performance and security that is especially useful for fending off network intrusion and attacks. It is a low-cost alternative to network taps and other solutions that may require additional hardware, disrupt normal network operation, affect client applications or may introduce a new point of failure into your network. Port mirroring is highly scalable and easy to monitor . It is especially convenient to use in networks where ports are scarce. Ports that can be configured to participate in mirroring include physical ports, virtual ports AND HOST PORTS6,!. INTERFACES AND INTRUSION DETECTION PORTS 7ITH this feature, analyzing bi-directional traffic and ensuring connectivity between, for example, a departmental switch and its high speed uplink to a backbone switch becomes simple and cost effective process. K-Series port mirroring relationships can be set on inbound traffic, OUTBOUND TRAFlC OR BOTH FOR UP TO PORT MIRRORS CONSISTING OF ONETOONE one-to-many, many-to-one, IDS or policy mirrors. &EATURE 3UMMARY Multi-layer packet classification - enables the delivery of critical applications to specific users via traffic awareness and control s 5SER PORT AND DEVICE ,EVEL ,AYER THROUGH PACKET CLASSIlCATION s 1O3 MAPPING TO PRIORITY QUEUES P )0 4O3 $3#0 UP TO queues per port s -ULTIPLE QUEUING MECHANISMS 301 7&1 722 AND (YBRID s 'RANULAR 1O3RATE LIMITING s 6,!. TO POLICY MAPPING Switching/VLAN services - provides high performance connectivity, aggregation, and rapid recovery services s %XTENSIVE INDUSTRY STANDARDS COMPLIANCE )%%% AND )%4& s )NBOUND AND OUTBOUND BANDWIDTH RATE CONTROL PER mOW s 6,!. SERVICES SUPPORT Security (User, Network and Management) s 5SER SECURITY !UTHENTICATION 8 -!# 07! AND #%0 -!# 3TATIC AND Dynamic) port locking -ULTIUSER AUTHENTICATIONPOLICIES s .ETWORK SECURITY - Access Control Lists (ACL) – basic and extended - Policy-based security services (examples: spoofing, unsupported protocol access, intrusion prevention, DoS attacks limits) s -ANAGEMENT 3ECURITY 3ECURE ACCESS TO THE +3ERIES VIA 33( 3.-0 V Management, Control and Analysis – provide streamlined tools for maintaining network availability and health s #ONlGURATION ,INK AGGREGATION )%%% AD -ULTIPLE SPANNING TREES )%%% S - Industry-standard CLI and web management support 2APID RECONlGURATION OF SPANNING TREE )%%% W -ULTIPLE lRMWARE IMAGES WITH EDITABLE CONlGURATION lLES s 0ROVIDER "RIDGES )%%% AD 1IN1 2EADY s &LOW SETUP THROTTLING s .ETWORK !NALYSIS 3.-0 VVCV 2-/. GROUPS AND 3-/. RFC 6,!. and Stats - Port/VLAN mirroring (one-to-one, one-to-many, many-to-many) - Unsampled NetFlow on every port with no impact on system switching and routing performance s $(#0 3ERVER IP Routing - provides dynamic traffic optimization, broadcast containment and efficient network resilience s 3TANDARD ROUTING FEATURES INCLUDE STATIC ROUTES 2)0V 2)0NG AND -ULTICAST ROUTING SUPPORT $6-20 )'-0 VVV 0OLICY "ASED 2OUTING AND 2OUTE -APS AND 6220 s ,ICENSED ROUTING FEATURES INCLUDE /30& VV 62& AND 0)-3- s !UTOMATED SETUP AND RECONlGURATION 2EPLACEMENT )/ MODULE WILL AUTOMATICALLY INHERIT PREVIOUS modules configuration Page 3 &EATURE2ICH &UNCTIONALITY Examples of additional functionality and features that are supported by the Enterasys K-Series: s .ET&LOW 0ROVIDES REALTIME VISIBILITY APPLICATION PROlLING AND capacity planning s ,,$0-%$ ,INK ,AYER $ISCOVERY 0ROTOCOL FOR -EDIA %NDPOINT Devices enhances VoIP deployments s &LOW 3ETUP 4HROTTLING &34 EFFECTIVELY PREEMPTS AND DEFENDS against DoS attacks s .ODE !LIAS ,OCATION !UTOMATICALLY TRACKS USER AND DEVICE LOCATION and enhances network management productivity and fault isolation s 0ORT 0ROTECTION 3UITE -AINTAIN NETWORK AVAILABILITY BY ENSURING GOOD protocol and end station behavior s &LEX%DGE 4ECHNOLOGY 0ROVIDES ADVANCED BANDWIDTH MANAGEMENT and allocation for demanding access/edge devices Flow Setup Throttling (FST) is a proactive feature designed to mitigate zero-day threats and Denial of Service (DoS) attacks before they can affect the network. FST directly combats the effects of zero-day and DoS attacks by limiting the number of new or established flows that can be programmed on any individual switch port. This is achieved by monitoring the new flow arrival rate and/or controlling the maximum number of allowable flows. In network operations, it is very time consuming to locate a device or find exactly where a user is connected. This is especially important when reacting to security breaches. Enterasys K-Series modules automatically track the network’s user/device location information by listening to network traffic as it passes through the switch. This information is then used to populate the Node/Alias table with information such as an ENDSTATIONS -!# ADDRESS AND ,AYER ALIAS INFORMATION )0 ADDRESS )08 ADDRESS ETC 4HIS INFORMATION CAN THEN BE UTILIZED BY %NTERASYS .-3 3UITE MANAGEMENT TOOLS TO QUICKLY DETERMINE THE SWITCH AND PORT number for any IP address and take action against that device in the event of a security breach. This node and alias functionality is unique to Enterasys and reduces the time to pinpoint the exact location of a problem from hours to minutes. For organizations looking to deploy Unified Communications, the Enterasys K-Series combines policy-based automation with support for MULTIPLE STANDARDSBASED DISCOVERY METHODS INCLUDING ,,$0-%$ 3)0 AND ( TO AUTOMATICALLY IDENTIFY AND PROVISION 5# SERVICES FOR )0 phones from all major vendors. K-Series switches also provide dynamic mobility for IP clients; when an IP phone moves and plugs in elsewhere in the enterprise network, its VoIP service provisioning, security and traffic priority settings move with it, with none of the typical manual administration required for moves, adds and changes. The K-Series also supports a comprehensive portfolio of port protection CAPABILITIES SUCH AS 30!.GUARD AND -!#,OCK WHICH PROVIDE THE ABILITY TO DETECT UNAUTHORIZED BRIDGES IN THE NETWORK AND RESTRICT A -!# ADDRESS TO A SPECIlC PORT /THER PORT PROTECTION FEATURES INCLUDE ,INK Flap, Broadcast Suppression and Spanning Tree Loop protection which protects against mis-configuration and protocol failure. Enterasys K-Series Flex-Edge technology provides line rate traffic classification for all access ports with guaranteed priority delivery for control plane traffic and high-priority traffic as defined by the Enterasys policy overlay. In addition to allocating resources for important network traffic, prioritized bandwidth can be assigned on a per port or per authenticated user basis. Flex-Edge technology is ideal for deployment in wiring closets and distribution points that can often suffer from spikes in UTILIZATION THAT CAUSE NETWORK CONGESTION 7ITH &LEX%DGE TECHNOLOGIES organizations no longer have to fear a momentary network congestion event that would result in topology changes and random packet discards. Page 4 3TANDARDS AND 0ROTOCOLS Switching/VLAN Services s s s s s s s s s s s s s s s s s s 'ENERIC 6,!. 2EGISTRATION 0ROTOCOL '620 U &AST %THERNET AB 'IGABIT %THERNET COPPER Z 'IGABIT %THERNET lBER AE 'IGABIT %THERNET lBER 1 6,!.S $ -!# "RIDGES 0ROVIDER "RIDGES )%%% AD 2EADY W 2APID RECONVERGENCE OF 3PANNING Tree S -ULTIPLE 3PANNING 4REE AD ,INK !GGREGATION AE 'IGABIT %THERNET X &LOW #ONTROL )0 -ULTICAST )'-0 SUPPORT V V V PER VLAN querier offload) *UMBO 0ACKET WITH -45 $ISCOVERY 3UPPORT FOR 'IGABIT ,INK &LAP $ETECTION $YNAMIC %GRESS !UTOMATED 6,!. 0ORT Configuration) 3AB ,,$0-%$ Standard IP Routing Features s s s s s s s s s s s s s s s s s s s s s s s s s s s s s 3TATIC 2OUTES 3TANDARD !#,S /30& WITH -ULTIPATH 3UPPORT /30& 0ASSIVE )NTERFACES )0V 2OUTING )0V 2OUTING #APABLE %XTENDED !#,S 0OLICYBASED 2OUTING 2&# )#-0 2&# !20 2&# 0ROXY !20 2&# )'-0 2&# #)$2 2&# 2&# /30&V 2&# /30&V .33! 2&# /30& )NTERACTIONS 2&# /30& )NTERACTIONS 2&# /30& $ATABASE /VERmOW $6-20 V 2&# 'ENERAL 2OUTING 2&# 3.40V FOR )0V )0V /3) 2&# 2)0)) -$ !UTHENTICATION 2&# )0 &ORWARDING 4ABLE -)" 2&# $(#0 3ERVER 2ELAY 2&# /30& WITH $IGITAL 3IGNATURES 2&# )'-0V 2&# /30&V 2&# /30& 3TANDARDIZATION 2EPORT 2&# 6220 2&# 0ROTOCOL )NDEPENDENT -ULTICAST 3PARSE -ODE s 2&# !DDRESS NOTATION COMPRESSION s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s 2&# 2)0V 2&# )0V 3PECIlCATION 2&# .EIGHBOR $ISCOVERY )0V 2&# )0V 3TATELESS !DDRESS Autoconfiguration 2&# 4RANSMISSION OF )0V OVER Ethernet 2&# $3 &IELD DElNITION IN )0VV Headers 2&# -,$V 2&# )0V 2OUTER !LERT /PTION 2&# 2OUTER 2ENUMBERING 2&# /30& .33! /PTION 2&# /30& 3TUB 2OUTER !DVERTISEMENT 2&# )'-0V 2&# 3.-0 !RCHITECTURE FOR -ANAGEMENT &RAMEWORKS 2&# -ESSAGE 0ROCESSING AND $ISPATCHING FOR 3.-0 2&# 3.-0 !PPLICATIONS 2&# 3.-0 !RCHITECTURE FOR -ANAGEMENT &RAMEWORKS 2&# -ESSAGE 0ROCESSING AND $ISPATCHING FOR 3.-0 2&# 3.-0 !PPLICATIONS 2&# !NYCAST 20 USING 0)2&# !LTERNATIVE )MPLEMENTATIONS OF /30& !"2S 2&# )0V !DDRESSING !RCHITECTURE 2&# -,$ -ULTICAST ,ISTENER $ISCOVERY 2&# !NYCAST 20 USING 0)- AND -3$0 2&# !LTERNATIVE )MPLEMENTATIONS OF /30& !"2S 2&# )0V !DDRESSING !RCHITECTURE 2&# -,$ -ULTICAST ,ISTENER $ISCOVERY 2&# 4EXTUAL #ONVENTIONS FOR )0V Flow Label 2&# 'RACEFUL /30& 2ESTART 2&# .ETWORK )NGRESS &ILTERING 2&# 6220 2&# -,$V 2&# )0V 3COPED !DDRESS !RCHITECTURE 2&# 'RACEFUL /30& 2ESTART )MPLEMENTATION 2EPORT 2&# 0RIORITIZED 4REATMENT OF /30&V Packets 2&# )0 6ERSION !DDRESSING Architecture 2&# )'-0 3NOOPING 2&# !UTHENTICATION #ONlDENTIALITY FOR /30&V 2&# 0)-32&# 0)-3- )%4& 0ROPOSED 3TD 2EQ Analysis 2&# )'-0V AND -,$V 2&# 3OURCE3PECIlC -ULTICAST FOR )0 2&# 0)-33- IN 2&# !NYCAST20 5SING 0)- s 2&# .EIGHBOR $ISCOVERY FOR )0V s 2&# /!- &UNCTIONS ON %THERNET,IKE Interfaces s 2&# %XTENDED )#-0 -ULTI0ART -ESSAGES s 2&# "32 FOR 0)s 2&# 0)- -)" s 2&# )'-0V-,$V-#!34 2OUTING Protocol Interaction s 2&# /30&V 'RACEFUL 2ESTART s 2&# 0)- "OOTSTRAP 2OUTER -)" s 2&# /30& /PAQUE ,3! /PTION s 2&# /30& FOR )0V s 2&# 6220 6ERSION Class of Service s s s s 3TRICT 0RIORITY 1UEUING 7EIGHTED &AIR 1UEUING WITH 3HAPING 4RANSMIT 1UEUES PER 0ORT 0ACKET #OUNT OR "ANDWIDTH BASED 2ATE ,IMITERS "ANDWIDTH 4HRESHOLDS BETWEEN +BPS AND 'BPS s )0 4O3$3#0 -ARKING2EMARKING s $ 0RIORITYTO4RANSMIT 1UEUE -APPING Network Security and Policy Management s s s s s s s s s s s s s s s 8 0ORTBASED !UTHENTICATION 7EBBASED !UTHENTICATION -!#BASED !UTHENTICATION #ONVERGENCE %NDPOINT $ISCOVERY WITH $YNAMIC 0OLICY -APPING 3IEMENS (&! #ISCO 6O)0 ( AND 3)0 -ULTIPLE !UTHENTICATION 4YPES PER 0ORT Simultaneously -ULTIPLE !UTHENTICATED USERS PER PORT WITH unique policies per user/End System (VLAN association independent) 2&# )%%% 2!$)53 5SAGE 'UIDELINES WITH 6,!. TO 0OLICY -APPING 7ORM 0REVENTION &LOW 3ET5P 4HROTTLING "ROADCAST 3UPPRESSION !20 3TORM 0REVENTION -!#TO0ORT ,OCKING 3PAN 'UARD 3PANNING 4REE 0ROTECTION "EHAVIORAL !NOMALY $ETECTION&LOW #OLLECTOR (non-sampled Netflow) 3TATIC -ULTICAST 'ROUP 0ROVISIONING -ULTICAST 'ROUP 3ENDER AND 2ECEIVER 0OLICY Control Management, Control and Analysis s 3.-0 VVCV s 7EBBASED -ANAGEMENT )NTERFACE s )NDUSTRY #OMMON #OMMAND ,INE )NTERFACE Page 5 3TANDARDS AND 0ROTOCOLS CONT s -ULTIPLE 3OFTWARE )MAGE 3UPPORT WITH 2EVISION 2OLL "ACK s -ULTICONlGURATION &ILE 3UPPORT s %DITABLE 4EXTBASED #ONlGURATION &ILE s #/- 0ORT "OOT 0ROM AND )MAGE $OWNLOAD VIA :-/$%s 4ELNET 3ERVER AND #LIENT s 3ECURE 3HELL 33(V 3ERVER AND #LIENT s #ABLETRON $ISCOVERY 0ROTOCOL s #ISCO $ISCOVERY 0ROTOCOL VV s 3YSLOG s &40 #LIENT s 3IMPLE .ETWORK 4IME 0ROTOCOL 3.40 s .ETmOW VERSION AND VERSION s 2&# 2!$)53 s 2&# 2!$)53 !CCOUNTING s 4!#!#3 FOR -ANAGEMENT !CCESS #ONTROL s -ANAGEMENT 6,!. s -ANY TO/NEPORT /NETO-ANY 0ORTS 6,!. -IRROR 3ESSIONS IETF and IEEE MIB Support s s s s s s s s s s s s s s s s s 2&# 2&# )0-)" 2&# "RIDGE -)" 2&# 23 -)" 2&# 2)0V -)" 2&# 4#0 -)" 2&# 5$0 -)" 2&# )0 &ORWARDING 4ABLE -)" 2&# 3.-0#OMMUNITY -)" 2&# 3.-0V 3-) 2&# 3.-0V4# 2&# 3-/. -)" 2&# P1 -)" 2&# %NTITY -)" 2&# 6220 -)" 2&# 2-/. -)" 2&# )& -)" 2&# )& )NVERTED 3TACK -)" s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s s 2&# 0HYSICAL 4OPOLOGY -)" 2&# 0)- -)" FOR )0V 2&# (# 2-/. -)" 2&# ).%4 !DDRESS -)" 2&# 3.-0 &RAMEWORK -)" 2&# 3.-0-0$ -)" 2&# 3.-0V !PPLICATIONS -)" 2&# 3.-0 5SER"ASED 3- -)" 2&# 3.-0 6IEW "ASED !#- -)" 2&# 3.-0V42&# 3.-0V -)" 2&# 3.-0 #OMMUNITY-)" 2&# 0OWER %THERNET -)" 2&# %THER,IKE -)" 2&# -!5 -)" 2&# -)" FOR THE 4RANSMISSION #ONTROL Protocol (TCP) 2&# -)" 5$0 2&# %NTITY -)" 2&# "'0 -)" 2&# )0 &ORWARDING -)" 2&# -)" FOR )0 2&# $)3-!. -)" 2&# /30&V -)" 2&# -!5 -)" 2&# -)" FOR THE 4RANSMISSION #ONTROL Protocol (TCP) 2&# -)" FOR THE 5SER $ATAGRAM Protocol (UDP) 2&# -'-$34$ -)" $RAFTIETFIDMRDVMRPV -)" $RAFTIETFPIMSMVNEW -)" 3.-02%!2#( -)" )!.!ADDRESSFAMILYNUMBERS -)" )%%% 0!% -)" )%%% ,!' -)" 2340 -)" 53- 4ARGET 4AG -)" 5 "RIDGE -)" Enterasys Network Management Suite s s s s s .-3 #ONSOLE .-3 0OLICY -ANAGER .-3 )NVENTORY -ANAGER .-3 !UTOMATED 3ECURITY -ANAGER .-3 .!# -ANAGER Page 6 3PECIlCATIONS K6 K10 Switching Fabric Bandwidth 'BPS 'BPS Switching Throughput -PPS -EASURED IN BYTE PACKETS -PPS -EASURED IN BYTE PACKETS 2OUTING 4HROUGHPUT -PPS -EASURED IN BYTE PACKETS -PPS -EASURED IN BYTE PACKETS Address Table Size -!# !DDRESSES -!# !DDRESSES VLANs Supported 4RANSMIT 1UEUES #LASSIlCATION 2ULES CHASSIS CHASSIS #HASSIS $IMENSIONS ( X 7 X $ ( CM v 7 CM v $ CM v 5U ( CM CM v 7 CM vv $ CM v 5 (OST -EMORY AND &LASH 'B $2! -" mASH MEMORY 'B $2! -" mASH MEMORY /PERATING 4EMPERATURE # TO # & TO & # TO # & TO & Storage Temperature # TO # & TO & # TO # & TO & /PERATING (UMIDITY TO RELATIVE HUMIDITY NONCONDENSING TO RELATIVE HUMIDITY NONCONDENSING 0OWER 2EQUIREMENTS TO 6!# ! OR TO 6!# ! TO (Z TO 6!# OR TO 6!# TO (Z System Power s !UTOMATED OR MANUAL 0O% POWER DISTRIBUTION s 0ERPORT ENABLEDISABLE POWER LEVEL PRIORITY SAFETY OVERLOAD and short-circuit protection s 3YSTEM POWER MONITOR s 0O% 0OWER 7 PER POWER SUPPLY TO 6!# 7 -AX 7 PER POWER SUPPLY AT TO 6!# 7 -AX s !UTOMATED OR MANUAL 0O% POWER DISTRIBUTION s 0ERPORT ENABLEDISABLE POWER LEVEL PRIORITY SAFETY OVERLOAD and short-circuit protection s 3YSTEM POWER MONITOR s 0O% 0OWER 7 PER POWER SUPPLY TO 6!# 7 -AX 7 PER POWER SUPPLY AT TO 6!# 7 -AX Standards Compliance s )%%% AF s )%%% AT s )%%% AF s )%%% AT Safety 5, &$! #&2 AND #!.#3! # .O %. %. %. )%# %# ,OW 6OLTAGE $IRECTIVE 5, &$! #&2 AND #!.#3! # .O %. %. %. )%# %# ,OW 6OLTAGE $IRECTIVE Electromagnetic Compatibility &## #&2 0ART #LASS ! )#%3 #LASS ! %. #LASS ! %. %. %. !3.: #)302 #LASS ! 6##) 6 #.3 "3-) %# %-# $IRECTIVE &## #&2 0ART #LASS ! )#%3 #LASS ! %. #LASS ! %. %. %. !3.: #)302 #LASS ! 6##) 6 #.3 "3-) %# %-# $IRECTIVE Environmental %# 2O(3 $IRECTIVE %# 7%%% $IRECTIVE -INISTRY OF )NFORMATION /RDER #HINA 2O(3 %# 2O(3 $IRECTIVE %# 7%%% $IRECTIVE -INISTRY OF )NFORMATION /RDER #HINA 2O(3 Performance/Capacity Physical Specifications Environmental Specifications Power over Ethernet Specifications Agency and Standard Specifications /RDERING )NFORMATION Part Number Description K6 Chassis +#HASSIS +3ERIES 3LOT #HASSIS AND &AN 4RAY +&!. + &AN 4RAY 3PARE +-)$+)4 + -ID-OUNT +IT K10 Chassis +#HASSIS +3ERIES 3LOT #HASSIS AND &AN 4RAY +&!. + &AN 4RAY 3PARE +-)$+)4 + -ID-OUNT +IT Page 7 /RDERING )NFORMATION Part Number Description Power Supplies and Accessories +!#037 +3ERIES 0OWER 3UPPLY ! 6!# INPUT 7 SYSTEM 7 0/% +0/%"!9 +3ERIES %XTERNAL "AY 0OWER 3HELF +0/%"!92!), -OUNTING +IT FOR +0/%"!9 +0/%#",- +3ERIES 0O% 0OWER TO + #HASSIS #ABLE - I/O Fabric Modules ++& + -ANAGEMENT&ABRIC -ODULE '" VIA 3&0 ++& + -ANAGEMENT&ABRIC -ODULE '" VIA 3&0 I/O Modules +4 +3ERIES 0ORT AT 0O% )/- +' +3ERIES 0ORT 'B 3&0 )/- ++ +3ERIES 0ORT 'B 3&0 )/- Licenses +%/3, !DVANCED 2OUTING ,ICENSE /30& 62& 0)-3- +%/300# K-Series Per Port User Capacity License Upgrade Transceivers Service and Support Enterasys transceivers provide connectivity options for Ethernet over twisted pair copper and fiber optic cables with transmission speeds FROM -EGABITS PER SECOND TO 'IGABITS PER SECOND !LL %NTERASYS transceivers meet the highest quality for extended life cycle and the best possible return on investment. For detailed specifications, compatibility and ordering information please go to HTTPWWWENTERASYSCOMPRODUCTSTRANSCEIVERSDSPDF Enterasys Networks provides comprehensive service offerings that range from Professional Services to design, deploy and optimize customer networks, customized technical training, to service and support tailored to individual customer needs. Please contact your Enterasys account executive for more information about Enterasys Service and Support. Warranty The Enterasys K-Series comes with a one year hardware warranty. For full warranty terms and conditions please go to HTTPWWWENTERASYSCOMSUPPORTWARRANTYASPX #ONTACT 5S &OR MORE INFORMATION CALL %NTERASYS .ETWORKS TOLL FREE AT OR AND VISIT US ON THE 7EB AT ENTERASYSCOM Patented Innovation © 2011 Enterasys Networks, Inc. All rights reserved. Enterasys Networks reserves the right to change specifications without notice. Please contact your representative to confirm current specifications. Please visit http://www.enterasys.com/company/trademarks.aspx for trademark information. 03/11 Delivering on our promises. On-time. On-budget.