The Enterasys K-Series is the most cost-effective flow-based switching solution in the industry. Providing exceptional levels of automation, visibility and control at the network edge, these flexible, modular switches significantly reduce operational costs while still offering premium features.
The K-Series is built upon the Enterasys CoreFlow2 custom ASIC. This cornerstone switching technology provides greater visibility into critical business applications and the ability to enable better controls to meet the Service Level Agreements (SLAs) demanded by the business.
Designed to address the challenges associated with a growing demand for access to new applications and services, the K-Series protects business traffic and supports changing operational needs. This includes the consumerization of IT and "bring your own device" programs that require more robust location, identification, visibility and overall management capabilities. The K-Series is uniquely suited to intelligently manage individual user, device and application conversations, as well as to provide the visibility and management to troubleshoot connectivity issues, locate devices, and ensure protection of corporate data.
Hardware-based high availability features
The K-Series includes many standard high availability features. These hardware-based high availability features allow the K-Series to be deployed in mission critical environments that require 24/7 availability.
Distributed, flow-based architecture
In order to ensure granular visibility and management of traffic without sacrificing performance, the Enterasys K-Series deploys a flow-based architecture. This architecture ensures that when a specific communications flow is being established between two end points, the first packets in that communication are processed through the multilayer classification engines in the switch and the I/O fabric module. In this process, the role is identified, the applicable policies are determined, the packets are inspected and the action is determined. After the flow is identified, all subsequent packets associated with that flow are automatically handled in the Enterasys ASICs without any further processing. In this way the Enterasys K-Series is able to apply a very granular level of control to each flow at full line rate.
Multi-User/Method Authentication and Policy
Authentication allows enterprise organizations to manage network access and provide mobility to users and devices. It provides a way to know who or what is connected to the network and where this connection is at any time. The Enterasys K-Series has unique, industry leading capabilities regarding types of simultaneous authentication methods.
Dynamic, flow-based packet classification
Another unique feature that separates the Enterasys K-Series from all competitive switches is the capability to provide User-Based Multi-layer Packet Classification/QoS. With the wide array of network applications used on networks today, traditional Multi-layer Packet Classification by itself is not enough to guarantee the timely transport of business-critical applications. In the K-Series, User-Based Multi-layer Packet Classification allows traffic classification not just by packet type, but also by the role of the user on the network and the assigned policy of that user. With User-Based Multi-layer Packet Classification, packets can be classified based on unique identifiers like "All Users", "User Groups", and "Individual User", thus ensuring a more granular approach to managing and maintaining network confidentiality, integrity, and availability.
Network visibility from high fidelity NetFlow
Enterasys NetFlow tracks every packet in every flow as opposed to more typical statistical sampling techniques or restrictive appliance-based implementations. The value of unsampled, real-time NetFlow monitoring is the visibility into exactly what traffic is traversing the network. If something abnormal occurs it will be captured by NetFlow and appropriate action can be applied. Additionally, NetFlow can be used for capacity planning, allowing the network manager to monitor the traffic flows and volumes of traffic in the network and understand where the network needs to be reconfigured or upgraded. This saves time and money by enabling administrators to know when and where upgrades might be needed.
Network traffic monitoring - port mirroringProduct Highlights
Port mirroring is an integrated diagnostic tool for tracking network performance and security that is especially useful for fending off network intrusion and attacks. It is a low-cost alternative to network taps and other solutions that may require additional hardware, disrupt normal network operation, affect client applications or may introduce a point of failure into your network. Port mirroring is highly scalable and easy to monitor. It is especially convenient to use in networks where ports are scarce. Ports that can be configured to participate in mirroring include physical ports, virtual ports and host ports - VLAN interfaces, and intrusion detection ports. With this feature, analyzing bi-directional traffic and ensuring connectivity between, for example, a departmental switch and its high speed uplink to a backbone switch becomes simple and cost effective process.
- Ensures each end-user receives the information, services and applications needed to achieve their business goals through extensive network visibility and control capabilities
- Green and efficient power system modularity drives down power and cooling costs by providing optimal incremental power consumption
- Consistent end user experience and network protection by effectively allocating critical network services while blocking suspicious traffic
- High-density, small form factor chassis provides up to (216) 10/100/1000 ports with (8) 10Gb uplinks in a standard rack, significantly reducing footprint costs
- Management automation and built-in resiliency features drive down operational costs and maximize uptime
- Automatically identifies and provisions devices and services reducing IT deployment time
- Reduces risk and simplifies network administration with built-in, not bolted-on security
- Protects business traffic from malicious attacks and maintains information confidentiality, integrity and availability
- Extends network access control and security to existing edge switches and wireless access points, meeting the challenges associated with the computerization of IT
- Industry-leading customer satisfaction and first call resolution rates