Riverstone Networks 6850 User Manual

Page 7

Advertising
background image

7

Alcatel-Lucent | OmniSwitch 6850

ALCATEL-LUCENT OMNIVISTA 2770 QUARANTINE MANAGER

In addition to proactive security provided by Alcatel-Lucent’s Access Guardian, the

Alcatel-Lucent OmniVista 2770 Quarantine Manager provides reactive security by using

alerts from Alcatel-Lucent OmniSwitch and third-party intrusion detection and prevention

systems to identify malicious attacks and then swiftly handling them through

automatic containment and remediation.

ALCATEL-LUCENT ACCESS GUARDIAN

Alcatel-Lucent’s Access Guardian is a security framework that enables network-wide

and user-based security by automatically detecting and authenticating the 802.1X

and non-802.1X supplicants connected to a single port, in any combination.

This provides users proactive security by preventing unauthorized network access or restricted access for remediation. In

addition to improved network security, Alcatel-Lucent’s Access Guardian reduces to zero the time a network administrator

spends for adding or moving users.

SECURITY

Alcatel-Lucent’s Access Guardian and OmniVista 2770 Quarantine Manager are components of Alcatel-Lucent’s CrystalSec

security framework that supports all of Alcatel-Lucent’s enterprise networking devices. This framework offers proactive

and reactive security solutions comprised of comprehensive switch-based security capabilities as well as integration with

security applications and appliances from industry leaders.

TRAFFIC ANOMALY DETECTION

Traffic anomaly detection (TAD) is one component of the network security provided by the AOS, which detects network

traffic anomalies and distinguishes malware traffic.

Network traffic anomalies are when traffic patterns in a network do not meet

expectations. TAD detects traffic anomalies by monitoring discrepancies in rates of a

user-port’s ingress and egress packets that match specific traffic patterns.

With an embedded traffic anomaly detection component,

the OmniSwitch 6850 can now:

monitor network traffic in real time

detect anomalies

report anomalies or dynamically quarantine the offending ports

This comes at low computational and deployment costs, since it does not require additional software or hardware to be

installed. TAD prevents the meltdown of the network by detecting and eliminating the impact of worms and other

malicious code at the edge of the network.

Advertising