4 | KEY SOLUTION |
•Intermediate Routing
This feature is needed for interconnection between segments in the access network, and between the access network and core network. In order to perform this function,
•Bandwidth Management
This feature allows the network administrator to allocate different amounts of bandwidth for each service and user, which will lead to more efficient bandwidth usage.
•Traffic Policing - ACL
Network traffic passing through the aggregation network will be filtered against defined access control list to eliminate unnecessary and malicious traffic.
•High Availability
Core Network
As its name implies, core network is where enterprises place their critical information technology resources. Core network makes up the enterprise network backbone. Network connection from the enterprise network (access and aggregation network), server farm, Internet and network management system culminate in core network. Because of its critical role, enterprises need high performance and reliable infrastructure for the core network. In meeting this challenge,
•Centralized Network Management
For large scale centralized network management,
•Centralized Access Point Management
AP Manager II provides centralized management for up to 20 fat wireless access points. Features supported by AP Manager II include mass configuration, mass firmware upgrade, fault management,
provides network administrators with the means of verifying and conducting regular maintenance checks without the need of physical travel.
End-to-End Security (E2ES)
E2ES is a unique security solution from
•Gateway Security
This carries out the security function for enterprise network at the gateway, the boundary between enterprise network and the Internet. It protects enterprise network from external security threats to ensure the secure operation of internal network. For this element of E2ES,
•Endpoint Security
This is the first line of defense within enterprise internal network. It protects enterprise network from security threats coming from inside the network.
•Joint Security
Joint Security is a security solution formed with
•User Authentication
Only users with valid access credentials are allowed to access the network.
•Policy Enforcement and Remediation
NAP will check and ensure system compliance of each user that has passed authentication process against enterprise security requirements such as updated