Comprehensive analysis of the development status of security Switches

Source: Internet
Author: User

At present, the Security Switch has become the core of the network, and its performance affects the overall performance and security of our network, while improving the efficiency of data forwarding. The Security Switch uses the access control list ACL to implement the security function of the packet filtering firewall, enhancing the security defense capability. The access control list was previously used only on the core router. In a security switch, the access control filtering measures can be implemented based on the source/Target switch slot, port, source/Target VLAN, source/Target IP address, TCP/UDP port, ICMP type or MAC address.

ACL not only allows network administrators to set network policies, but also allows or denies control over individual users or specific data streams. It can also be used to enhance network security shielding, hackers cannot find a specific host on the network to detect the attack.

Intrusion detection IDS

The IDS function of the security switch can detect the reported information and data stream content, and perform targeted operations when detecting network security events, these actions that respond to security events are sent to the vswitch for precise port disconnection. To achieve this kind of association, the switch must be able to support functions such as authentication, Port Mirroring, forced stream classification, process count control, and port lookup.

Equipment redundancy is also important

Physical security, that is, redundancy, is the guarantee for safe network operation. No manufacturer can ensure that its products do not fail, but whether the product can be quickly switched to a good device in case of a fault is a matter of concern. Redundant devices, such as the backup power supply, backup management module, and redundant port, can ensure that the backup modules and network operations are immediately assigned even if the device fails.

Deployment of Security Switches

The emergence of Security switches greatly enhances the security of the network at the vswitch level. Security switches can be deployed at the core of the network, just like Cisco Catalyst 6500, a modular core switch that focuses security functions. In this way, security policies can be configured on core switches to achieve centralized control and facilitate monitoring and adjustment by network administrators. In addition, the core switches have powerful capabilities, and security performance is a very expensive task. The core switch can do its best to do this.

Placing a security switch on the network access layer or aggregation layer is another option. In this way, the core of the security switch is to put power down to the edge, and then implement the performance of the security switch on each edge, blocking intrusion and attacks and suspicious traffic out of the edge, ensure the security of the entire network. In this way, security switches need to be deployed on the edge. Many manufacturers have launched security switches for edge or aggregation layers. They build a solid security line around the core just like a bastion host.

Security switches sometimes cannot be alone. For example, the PPPoE authentication function requires support from the Radius server. In addition, some other switches can interact with intrusion detection devices, you need support from other network devices or servers.

Security Switch upgrade

At present, many new security switches are available on the market. They provide some security functions as soon as they are released. So how can some old switches be secured. Generally, this problem is well solved for modular switches. The common solution is to insert new security modules on the old modular switch. For example, Cisco Catalyst 6500 has firewall modules, intrusion detection IDS modules, and other security modules; the 6610 switch of Digital China is equipped with the PPPoE authentication module. Directly inserting the old switch can solve these new problems. If the previously purchased switch is a fixed switch, some competent models need to install new security functions by upgrading the firmware.

Prospect of a Security Switch

As users have higher and higher requirements on the network environment, the demand for switches with security features is also growing. Many users believe that it is worthwhile to invest a certain amount in vswitch security to improve the robustness and security of the entire network. In particular, some industry users have no need to connect to the network. Such as banks, securities, and large enterprises, the loss caused by one or more outbreaks of Network viruses is sufficient to exceed the additional investment on Security switches. The security switch has become a new highlight in the switch market.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.