Brocade Communications Systems Bigiron RX Series User Manual

Page 3

Advertising
background image

• metro ring Protocol (mrP):

An alternative to Spanning Tree Protocol,
MRP provides sub-second fault detection
and failover for Ethernet ring topologies.
MRP works in conjunction with VSRP
and 802.3ad based link aggregation to
provide bandwidth scalability and SoNEt-
like resilience.

• Virtual switch redundancy Protocol

(VsrP):

Supports sub-second fault

detection and fail-over for mesh topologies
in which redundant switches provide
back-up operation for one another

• single-instance stP:

Provides a single

instance of STP to run on all port-based
VLaNs within a single device, interoperable
with others that are 802.1d compliant

• rapid spanning tree Protocol based

on ieee 802.1w:

Dramatically improves

the spanning tree convergence time to sub-
second by automatically renegotiating port
roles in case of a link failure without relying
on timers

• Per Vlan spanning tree (PVst):

Allows

for control of StP on an individual VLaN
basis for traffic engineering VLaN traffic
(i.e., load distribution)

• topology groups:

Dramatically improves

Layer 2 control protocol scalability by
allowing a few instances of STP, RSTP,
MRP, or VSRP to control large groups
of VLaNs

• super aggregated Vlans (saVs):

Allows

transparent tunneling of multiple VLaNs
through a single backbone VLaN

• Pim and igmP snooping:

offers efficient

handling of multicast traffic in Layer 2
topologies by identifying ports that request
a multicast stream and forwarding the
stream only on these ports. This dramatically
improves the performance of multicast
applications, allowing for many more
streams to be transiting the network.

advanced Quality of service

• advanced Qos:

Allows administrators to

enforce QoS policies based on port, VLaN,
source Mac, acL rules, 802.1p priority,
Type of Service (ToS), DiffServ settings or
Rate Limiting status

• Very low latency across all Packet sizes:

Consistent low latency for strict priority
applications such as voice over IP, high
performance computing and video over IP

• Configurable Combinations of Queuing

Disciplines and Congestion Control
Policies:

Combinations of Strict Priority (SP)

and Weighted Fair Queuing (WFQ) provide
flexibility for network administrators. In
the event of egress port congestion,
traffic policies can be configured for tail
drop or weighted random early detection
(WREd) operation.

• advanced bandwidth management:

Allows intelligent bandwidth management
using hardware based enforcement of
Committed Information Rate (CIR) with
Excess Burst control capabilities and
seamless integration with other advanced
QoS features including priority marking
and honoring.

Cohesive, Unified and Easy-to-Use

network management

• Centralized network management:

Brocade IronView Network Manager is a
Web-based, graphical interface tool that
empowers network operators to seamlessly
control software and configuration updates

• Command line interface (Cli):

Industry-standard configuration interface,
consistent and common throughout
Brocade products

• web interface:

Provides easy-to-use

Graphical User Interface (GUI) for system
configuration from standard Web browsers

• sFlow (rFC 3176):

Provides scalable,

wire-speed network monitoring and
accounting with no impact on network
performance

brocade ironshield security

• wire-speed extended layer 2, layer 3

and 4 access Control lists (aCl):

Control

packet forwarding and restricts access to
the system management interface, while
providing wire-speed switching and routing:

– extensible aCl implementation for

layer 3 and 4 information:

Identifies

traffic based on source or destination
IP address, IP protocol type, TCP or
UDP port, IP precedence or ToS values

– Flexible aCl implementation for

layer 2 information:

Identifies traffic

based on source or destination MAC
address, Ethernet type, VLaN-Id
values and 802.1p values

– aCl scalability: Support for up to

8,000 acLs

– ease of administration: Identify an ACL

by name or number, or add a comment
line for ease of administration

– secure shell and secure Copy:

Provides secure access to the
administration and management
interface over the network

• Protection against Denial of service

(Dos) attacks:

Prevents or minimizes

network downtime from malicious users
by limiting tcP SYN and IcMP traffic and
protects against broadcast storms

• user authentication:

Authentication with

aaa, 802.1x, RadIUS, tacacS, and tacacS+
prevents unauthorized network access

• maC Port security:

Controls the MAC

addresses allowed per port

• sFlow (rFC 3176):

Provides cost-effective,

scalable, wire-speed network monitoring
to detect unusual network activity

• snmPv3:

Secured SNMP management

with authentication and privacy services

• bgP-guard:

Complements MD5 security

for BGP sessions to protect against session
disruption by restricting the number of
hops the BGP session can traverse

Advertising