Cisco Systems 3750 Series manual Intelligent Switching, Security

Models: 3750 Series

1 10
Download 10 pages 38.32 Kb
Page 6
Image 6
Intelligent Switching

Intelligent Switching

Q. Why do I need intelligence at the edge of my network?

A. Networks are evolving to address four new developments at the network edge:

Increase in desktop computing power

Introduction of bandwidth-intensive applications

Expansion of highly sensitive data on the network

Presence of multiple device types, such as IP phones and wireless LAN access points

These new demands are contending for resources with many existing mission-critical applications. As a result, IT professionals must view the edge of the network as critical to effectively manage the delivery of information and applications. As companies increasingly rely on networks as the strategic business infrastructure, it is more important than ever to ensure their high availability, security, scalability, and control. By adding Cisco intelligent functions to the wiring closet, customers can now deploy networkwide intelligent services that address these requirements in a consistent way from the desktop to the core and through the WAN.

With Cisco Catalyst Intelligent Ethernet switches, Cisco helps companies to realize the full benefits of adding intelligent services to their networks. Deploying capabilities that make the network infrastructure highly available to accommodate time-critical needs, scalable to accommodate growth, secure enough to protect confidential information, and capable of differentiating and controlling traffic flows are key to further optimizing network operations.

Q. Can you provide more details on how Cisco intelligent switching will help my network?

A. New applications are requiring higher bandwidth and the need to differentiate and control the traffic flow. Applications such as enterprise resource planning (ERP) (Oracle, SAP, etc.), voice (IP telephony traffic) and CAD/ CAM require prioritization over less time-sensitive applications such as FTP or Simple Mail Transfer Protocol (SMTP). It would be highly undesirable to have a large file download destined to one port on a wiring closet switch and have quality implications such as increased latency in voice traffic, destined to another port on this switch. This condition is avoided by ensuring that voice traffic is properly classified and prioritized throughout the network. Cisco Intelligent Ethernet switches implement superior QoS to ensure that network traffic is classified, prioritized, and congestion is avoided.

Security

Q. How will the security needs of a network be handled?

A.With the rise in internal threats to a network, Cisco Ethernet switches enhance data security through a wide range of features including Secure Shell (SSH) and Simple Network Management Protocol version 3 (SNMPv3) protocols, ACLs, 802.1x, port security, private VLAN edge, Dynamic Host Configuration Protocol (DHCP) interface tracker, MAC address notification, and RADIUS/TACACS+. Depending on your security needs, the Cisco Catalyst 3550 Series complements devices such as firewalls, VPNs, and Intrusion Detection Systems.

Q.For security purposes, how can I protect unauthorized users from accessing my network?

A.The Cisco Catalyst 3750 supports 802.1x that works in conjunction with a RADIUS server to authenticate users as they access a network. The 802.1x standard is considered port-level security and is commonly used for wireless LANs. Additionally, portions of the network can be restricted by using ACLs. Access can be denied based on Media

Cisco Systems, Inc.

All contents are Copyright © 1992–2003 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 6 of 10

Page 6
Image 6
Cisco Systems 3750 Series manual Intelligent Switching, Security