Ruijie Network: Security switches are the lifeblood of Security Solutions

Source: Internet
Author: User

Looking at the history of network development, from manageable to intelligent, from high performance to multiple applications, from single data transmission to voice/image/multiple media applications, etc, the speed and trend of today's network technology development far exceeds people's expectation.

Network equipment manufacturers and integrators design considerate networks that meet the needs of users based on their different needs. However, regardless of the characteristics of the network, network security is always crucial, is an eternal theme. Because network security is an important guarantee for information applications.

Who will ensure network security?

With the development of network technology, a variety of network security application solutions have emerged for major network equipment manufacturers at home and abroad. From the firewall and Intrusion Detection System IDS that prevent external attacks to the deployment of security switches that prevent internal attacks, from local network prevention to global network defense, from passive prevention to active defense, etc, to better protect network security.


STAR-S3550-24G

According to a survey by authoritative organizations, 80% of attacks and unauthorized access come from the internal network, because there are a large number of applications related to the enterprise business in the network, for example, office automation, ERP, multimedia teaching, Email servers, and Web Services, to fundamentally eliminate internal attacks and illegal elevation of authority, we must first strengthen the security prevention and security management of internal networks in enterprises and institutions, that is, security switches must be used inside the LAN.

From access to convergence to core, each layer of switches must have security mechanisms and defense policies, which are checked and controlled layer by layer to prevent unauthorized users from accessing the network, attackers can steal important network information, such as damaging the Email server and attacking the layer-3 gateway. This can paralyze the network, making it impossible for users on the network to send and receive emails.) legitimate users can reasonably use network resources, prevent legal users from unintentional, intentional, or malicious attacks on the network (such as malicious download of BT), prevent a large amount of consumption and possession of network bandwidth resources, Block network outlets, and make normal office teaching impossible.

According to the above analysis, we can see that in all these policy mechanisms and solutions, the deployment of security switches is always the first and crucial. It can be said that security switches are the lifeblood of security solutions. The vswitches of the ruijie network are designed and embedded with different security mechanisms and policies for different deployment locations in their network environments. Access Switch STAR-S2100 series is mainly deployed in the network access layer; and STAR-S3550 series and RG-S3750 series switches are mainly deployed in the convergence layer of the network, can give full play to the role of Three Layer Gateway.

Establish a security portal and strictly control access

Secure Access Switch STAR-S2100 series play a role in security portal, it must be able to prevent illegal users from accessing the network. STAR-S2100 series switches can provide different security access control policies according to the network scale and network application, such as 802.1x access control combined with the powerful RG-SAM System of ruijie network, can strictly control the access to users, it also ensures that users are consistent before, during, and after Internet authentication, so as to avoid unauthorized tampering with information such as MAC addresses and IP addresses after authentication for attacks.

In addition, the STAR-S2100 series has port hardware bound to the user IP address and MAC address, a variety of ACL control policies, you can flexibly control the user access according to the needs of the user network environment.

STAR-S2100 series with expert-level ACL, with "Deep application Recognition and Control" capabilities, the bandwidth speed limit and IGMP Multicast Source Port Check of time-based data streams are all processed by the FFP Processing Module Hardware integrated in the switch's internal advanced switch chip, the following security policy functions are implemented when data is forwarded across the entire line:

Control the access of legitimate users to network resources; control users' possession of network bandwidth information through malicious downloading through BT; Ensure priority transmission of important tasks such as voice and multimedia applications, and occupy reasonable Bandwidth Resources; illegal Multicast Source playback information and possession of network bandwidth resources are controlled to effectively ensure the rational operation and use of the network.

Use layer-3 forwarding to effectively prevent attacks

In a network, aggregation layer switches and core layer switches have different roles than access switches. They bear the burden of gateway and layer-3 route forwarding. Due to the serious impact and harm of IP scanning and DoS attacks on layer-3 switches, CPU processing in the switch is often at full capacity, resulting in a decline in the switch's processing capabilities, or even paralysis, and users cannot access the Internet normally.

In this regard, ruijie network convergence switch STAR-S3550 series and RG-S3750 switches, as well as core Routing Switch RG-S6500 series and RG-S6800E series, are using the industry's leading switching chip, it uses an advanced hardware layer-3 forwarding mechanism with the longest matching forwarding mode) to effectively combat malicious IP address scanning.

At the same time, the switch is embedded with security policies, such as internal anti-DoS attacks and anti-IP scanning mechanisms, to ensure that the packet forwarding function is not affected by IP scanning and attacks. The IGMP source port and source IP address check function prevents and controls illegal multicast sources, and controls access permissions for various hardware ACLs, such as expert-level ACLs and time ACLs, it guarantees the robust operation of the network.

Enhance level control to achieve global interaction

While providing security mechanisms, re network switches also consider the security of the switches themselves.

Switches are one of the checkpoints in the network. If all the checkpoints are attacked or even paralyzed, how can they control the checkpoints?

Re network switches support encrypted transmission of management information over SSH and SNMPv3, from access STAR-S2100 to aggregation STAR-S3550, RG-S3750 to core Backbone Routing Switch RG-S6500 series and RG-S6800E series, supports source IP address control for Telnet/Web access switches. This not only enhances the security of device network management, but also effectively avoids malicious attacks and controls devices.

In addition, it is particularly worth noting that, in order to facilitate the network switch security policy settings, ruijie network STAR-S2100 Series Access Security switches also support the automatic synchronous Security Policy issuing function. In concert with the "GSN global security network solution" of ruijie network, global interaction is achieved in the same network environment, so that every device in the network is playing a role in security protection.

RG-S6810E

To sum up, the vswitch security policy will develop towards automation, linkage and integration in the future. On the edge of the network, you must deploy access security switches. They will play the role of a network portal, starting from the access of each user to control and limit the behavior of network users.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.