10.11.2014 Views

PRODUCT / SOLUTION 2010 - D-Link

PRODUCT / SOLUTION 2010 - D-Link

PRODUCT / SOLUTION 2010 - D-Link

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

B-4 KEY <strong>SOLUTION</strong><br />

• Intermediate Routing<br />

This feature is needed for interconnection between<br />

segments in the access network, and between the access<br />

network and core network. In order to perform this<br />

function, D-<strong>Link</strong> solution provides support for static route,<br />

RIP I/II, OSPF and RIPng for IPv6 implementation.<br />

• Bandwidth Management<br />

This feature allows the network administrator to allocate<br />

different amounts of bandwidth for each service and<br />

user, which will lead to more efficient bandwidth usage.<br />

• Traffic Policing - ACL<br />

Network traffic passing through the aggregation network<br />

will be filtered against defined access control list to<br />

eliminate unnecessary and malicious traffic.<br />

• High Availability<br />

D-<strong>Link</strong> provides high availability of aggregation network<br />

with redundancy power supply, stacking configuration<br />

and Virtual Router Redundancy Protocol (VRRP).<br />

Core Network<br />

As its name implies, core network is where enterprises<br />

place their critical information technology resources. Core<br />

network makes up the enterprise network backbone.<br />

Network connection from the enterprise network<br />

(access and aggregation network), server farm, Internet<br />

and network management system culminate in core<br />

network. Because of its critical role, enterprise needs<br />

high performance and reliable infrastructure for the<br />

core network. In meeting this challenge, D-<strong>Link</strong> offers<br />

its xStack Layer-3 switches and Layer-3 chassis switches.<br />

D-<strong>Link</strong> core network solution provides high switching<br />

capacity with 10 Gigabit connections to ensure high speed<br />

and excellent core network performance. In addition, to<br />

provide an ideal core network infrastructure, D-<strong>Link</strong> also<br />

enrich this high performance infrastructure with features<br />

such as high availability (stacking configuration, VRRP),<br />

and routing for IPv4, IPv6 and multicast traffic. Besides<br />

providing excellent core network infrastructure, D-<strong>Link</strong> also<br />

provides network management and storage solution for<br />

comprehensive core network solution.<br />

D-<strong>Link</strong> offers two solutions for Centralized Network<br />

Management, namely, the AP Manager II and D-View 6.0.<br />

• Centralized Network Management<br />

For large scale centralized network management, D-<strong>Link</strong><br />

provides D-View 6.0 Simple Network Management<br />

Protocol (SNMP) software. D-View 6.0 is a centralized<br />

management system that covers a wide range of network<br />

devices such as access points, managed switches and<br />

SNMP capable routers. It allows the network administrator<br />

to manage and monitor critical network characteristic<br />

such as device configuration, network performance,<br />

security and fault tolerance.<br />

• Centralized Access Point Management<br />

AP Manager II provides centralized management for<br />

up to recommended 20 fat wireless access points. Features<br />

supported by AP Manager II include mass configuration,<br />

mass firmware upgrade, fault management, real-time<br />

monitoring and real-time reporting. This software<br />

provides network administrators with the means of<br />

verifying and conducting regular maintenance checks<br />

without the need of physical travel.<br />

End-to-End Security (E2ES)<br />

E2ES is a unique security solution from D-<strong>Link</strong> that covers the<br />

entire enterprise network from the access network to core<br />

network. This solution consists of three elements:<br />

• Gateway Security<br />

This carries out the security function for enterprise<br />

network at the gateway, the boundary between<br />

enterprise network and the Internet. It protects<br />

enterprise network from external security threats to<br />

ensure the secure operation of internal network. For<br />

this element of E2ES, D-<strong>Link</strong> present the NetDefend<br />

UTM/IPS firewall. This firewall is equipped with various<br />

advanced security features such as illegal traffic detection,<br />

intrusion detection prevention, anti-spam, anti-virus, web<br />

content filtering, high availability, VPN and more.<br />

• Endpoint Security<br />

This is the first line of defense within enterprise internal<br />

network. It protects enterprise network from security<br />

threats coming from inside the network. D-<strong>Link</strong> provides<br />

this solution by pushing intelligence to its xStack<br />

switch as an evolutionary endpoint security that performs<br />

authentication, authorization, traffic control, node address<br />

control and attack mitigation. Some of the endpoint<br />

security functions supported by the D-<strong>Link</strong> xStack switch<br />

are access control (802.1X, MAC-based, web-based),<br />

dynamic VLAN assignment, loopback detection, IP-MAC-<br />

Port binding, rogue DHCP server detection, Safeguard<br />

Engine, and broadcast storm control.<br />

• Joint Security<br />

Joint Security is a security solution formed with D-<strong>Link</strong><br />

ZoneDefense and Microsoft Network Access Protection<br />

(NAP) to provide user access control and comprehensive<br />

security mechanism for enterprise network. D-<strong>Link</strong><br />

ZoneDefense is a unique security technology that enables<br />

D-<strong>Link</strong> NetDefend firewall to work together with<br />

D-<strong>Link</strong> xStack switch to carry out an advanced defense<br />

mechanism. With this defense mechanism, the firewall<br />

will block any malicious traffic or security threat and<br />

inform the xStack switch within the enterprise network<br />

to block the suspected host. ZoneDefense, in this way,<br />

effectively stops security threats and virus/worm infections<br />

and outbreaks. D-<strong>Link</strong> Joint Security offers two important<br />

functions for user access control in enterprise network:<br />

• User Authentication<br />

Only users with valid access credential allowed<br />

accessing the network.<br />

• Policy Enforcement and Remediation<br />

nAP will check and ensure system compliance of<br />

each user that has passed authentication process<br />

against enterprise security requirements such as<br />

updated anti-virus definition of network host, updated<br />

operating system patch of network host or personal<br />

firewall in active status. Only network hosts that meet<br />

the security requirements specified will be allowed to<br />

access the network.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!