Cisco CD-3550-EMI Datasheet Download Page 4

 

 

© 2005 Cisco Systems, Inc. All rights reserved. 

Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. 

Page 4 of 18 

 
 

aggregator switch. If one of the uplinks fails, quicker failover to the redundant uplink can be achieved via a scalable routing protocol such as Open 

Shortest Path First (OSPF) or Enhanced Interior Gateway Routing Protocol (EIGRP) rather than relying on standard Spanning-Tree Protocol 

convergence. Redirection of a packet after a link failure via a routing protocol results in faster failover than a solution that uses Layer 2 Spanning 

Tree enhancements. Additionally, routed uplinks allow better bandwidth utilization by implementing equal cost routing (ECR) on the uplinks to 

perform load balancing. This results in dynamic load balancing in a part of the network that often acts as the bottleneck. And, routed uplinks 

optimize the utility of uplinks out of the wiring closet by eliminating unnecessary broadcast data flows into the network backbone. 

The Catalyst 3550 also offers dramatic bandwidth savings as a stackable wiring closet switch in a multicast environment. Using routed uplinks to the 

network core will eliminate the requirement to transmit multiple streams of the same multicast from the upstream content servers to the wiring 

closet. For example, if three users are assigned to three separate virtual LANs (VLANs) and they all want to view multicast ABC, then three streams 

of multicast ABC are required to be transmitted from the upstream router to the wiring closet switch—assuming the wiring closet switch is not 

capable of routed uplinks. Deploying IP routing to the core with Catalyst 3550 switches allows users to create a scalable, multicast- rich network. 

NETWORK SECURITY THROUGH ENHANCED SECURITY FEATURES 

The Cisco Catalyst 3550 Series switches offer enhanced data security through a wide range of security features that protect network management 

and administrative traffic, secure the network from unauthorized users, provide granular levels of network access to users, and track where users 

are located. 

Secure Shell (SSH), Kerberos, and Simple Network Management Protocol version 3 (SNMPv3) encrypt administrative and network management 

information, thereby protecting it from tampering or eavesdropping. Terminal Access Controller Access Control System () or Remote 

Access Dial-In User Service (RADIUS) authentication enables centralized access control of switches and restricts unauthorized users from altering 

the configurations. Alternatively, a local username and password database can be configured on the switch itself. Fifteen levels of authorization on 

the switch console and two levels on the web-based management interface provide the ability to give different levels of configuration capabilities 

to different administrators. 

Port security and 802.1x provide the ability to keep unauthorized users from accessing the network. Port security limits access on an Ethernet port 

based on the MAC address of the device that is connected to it. It can also be used to limit the total number of devices plugged into a switch port, 

thereby reducing the risks of rogue wireless access points or hubs. 802.1x can be used to authenticate users based on username and password (or 

other credentials) via a centralized RADIUS server. This is particularly useful for a mobile workforce because the authentication will be executed 

regardless of where the user connects to the network. 

ACLs restrict access to sensitive portions of the network by denying packets based on source and destination MAC addresses, IP addresses, or 

TCP/UDP ports. ACL lookups are done in hardware; therefore, forwarding and routing performance is not compromised when implementing ACL-

based security in the network. Catalyst 3550 Series switches offer VLAN, router and port-based ACLs. Deploying ACLs can be done through Cisco 

CMS Software Security Wizards, which in a few easy steps can restrict user access to a server, a portion of the network, or the usage of certain 

applications. 

Identity-based Networking Services (IBNS) provide the ability to dynamically administer granular levels of network access. Leveraging the 802.1x 

standard and Cisco’s Access Control Server (ACS), when users authenticate they can be assigned a VLAN and/or an ACL regardless of where they 

connect to the network. This functionality allows IT departments to enable strong security policies without compromising user mobility and with 

minimal administrative overhead. 

The MAC Address Notification feature can be used to monitor the network and track users by sending an alert to a management station so that 

network administrators know when and where users entered the network. The Dynamic Host Configuration Protocol (DHCP) Interface Tracker 

(Option 82) feature tracks where a user is physically connected on a network by providing both switch and port ID to a DHCP Server. 

Summary of Contents for CD-3550-EMI

Page 1: ...t Power System 675 RPS 675 for seamless protection against internal power supply failures and an uninterruptable power supply UPS system to safeguard against power outages The Cisco Catalyst 3550 Series Intelligent Ethernet Switches include the following configurations Catalyst 3550 24 Switch 24 10 100 ports and two Gigabit Interface Converter GBIC based Gigabit Ethernet ports 1 rack unit RU Catal...

Page 2: ...networks as the strategic business infrastructure it is more important than ever to ensure their high availability security scalability and control By adding Cisco intelligent functionality to the wiring closet customers can now deploy network wide intelligent services that address these requirements in a consistent way from the desktop to the core and through the WAN With Cisco Catalyst Intellige...

Page 3: ...racle SAP etc voice IP telephony traffic and CAD CAM over less time sensitive applications such as FTP or e mail Simple Mail Transfer Protocol SMTP For example it would be highly undesirable to have a large file download destined to one port on a wiring closet switch and have quality implications such as increased latency in voice traffic destined to another port on this switch This condition is a...

Page 4: ...te Access Dial In User Service RADIUS authentication enables centralized access control of switches and restricts unauthorized users from altering the configurations Alternatively a local username and password database can be configured on the switch itself Fifteen levels of authorization on the switch console and two levels on the web based management interface provide the ability to give differe...

Page 5: ...itive assistance In addition Cisco AVVID Architecture for Voice Video and Integrated Data Wizards provide automated configuration of the switch to optimally support video streaming or videoconferencing voice over IP VoIP and mission critical applications Additional wizards for LAN security and multicast traffic are available too These Wizards can save hours of time for network administrators elimi...

Page 6: ...w Rapid Spanning Tree Protocol RSTP provides rapid convergence of the spanning tree independent of spanning tree timers Supports Cisco HSRP to create redundant fail safe routing topologies Redundant stacking connections provide support for a redundant loopback connection for top and bottom switches in an independent stack backplane cascaded configuration Command switch redundancy enabled in the CM...

Page 7: ...configuration eases deployment of switches in the network by automatically configuring multiple switches across a network via a boot server Automatic QoS Auto QoS greatly simplifies the configuration of QoS in VoIP networks by issuing interface and global switch commands that allow the detection of Cisco IP phones the classification of traffic and egress queue configuration Auto sensing on each no...

Page 8: ...SNMPv3 provides network security by encrypting administrator traffic during Telnet and SNMP sessions SSH Kerberos and the crypto version of SNMPv3 require a special crypto software image due to US export restrictions User and Device Authentication IEEE 802 1x for dynamic port based security to prevent unauthorized clients from gaining access to the network Port Security secures the access to a por...

Page 9: ...ow as 8 Kbps Rate limiting based on source destination IP address source destination MAC address or Layer 4 TCP UDP information or any combination of these fields using QoS ACLs IP ACLs or MAC ACLs class maps and policy maps Per port per VLAN ingress policing enables the rate limiting of individual VLANs on trunk ports Ability to easily manage data flows asynchronously upstream and downstream from...

Page 10: ...twork topology Supported by the CiscoWorks LAN Management Solution includes Resource Manager Essentials Campus Manager CiscoView and Device Fault Manager QoS Policy Manager QPM ACS User Registration Tool URT CiscoWorks SNMS Service Level Manager and Internet Performance Monitor IPM Superior Cisco IOS CLI support provides common user interface and command set with all Cisco Manageability routers an...

Page 11: ...SCO BULK FILE MIB CISCO CDP MIB CISCO CLUSTER MIB CISCO CONFIG COPY MIB CISCO CONFIG MAN MIB CISCO ENVMON MIB CISCO FLASH MIB CISCO FTP CLIENT MIB CISCO HSRP EXT MIB CISCO HSRP MIB CISCO IGMP FILTER MIB CISCO IMAGE MIB CISCO IPMROUTE MIB CISCO MAC NOTIFICATION MIB CISCO MEMORY POOL MIB CISCO PAGP MIB CISCO PORT QOS MIB CISCO PROCESS MIB CISCO RTTMON MIB CISCO STACKMAKER MIB CISCO STACK MIB CISCO S...

Page 12: ... 1000BASE CWDM GBIC 1550nm 1000BASE CWDM GBIC 1570nm 1000BASE CWDM GBIC 1590nm 1000BASE CWDM GBIC 1610nm RMON I and II standards SNMPv1 SNMPv2c SNMPv3 Y2K Y2K compliant Connectors and Cabling 10BASE T ports RJ 45 connectors two pair Category 3 4 or 5 unshielded twisted pair UTP cabling 100BASE TX ports RJ 45 connectors two pair Category 5 UTP cabling 1000BASE T ports RJ 45 two pair Category 5 UTP ...

Page 13: ...ers connection for an optional Cisco RPS 300 that uses AC input and supplies DC output to the switch The connector offers a 300 watt redundant power system that can support six external network devices and provides power to one failed device at a time The connector automatically senses when the internal power supply of a connected device fails and provides power to the failed device preventing los...

Page 14: ...770 bystander position operating to an ambient temperature of 30 degrees Celsius Catalyst 3550 12G and 3550 12T 58 dBa Catalyst 3550 24 and 3550 24 DC 48 dBa Catalyst 3550 48 and 3550 24 FX 46 dBa Catalyst 3550 24 PWR 47 dBa Mean Time Between Failure MTBF 110 332 hours Catalyst 3550 12G 113 658 hours Catalyst 3550 12T 166 356 hours Catalyst 3550 24 PWR 193 000 hours Catalyst 3550 24 163 000 hours ...

Page 15: ... technical repositories Telephone support through the Technical Assistance Center Advance replacement of hardware parts Enables proactive or expedited issue resolution Lowers cost of ownership by utilizing Cisco expertise and knowledge Minimize network downtime Table 3 Ordering Information Model Numbers Configuration WS C3550 12G 10 1000BASE X ports 2 10 100 1000BASE T ports 1 5 RU stackable multi...

Page 16: ...e multilayer switch integrated inline power Delivers enterprise class intelligent services to the network edge EMI installed Provides advanced IP routing WS C3550 48 SMI 48 10 100 ports 2 1000BASE X ports 1 RU stackable multilayer switch Delivers enterprise class intelligent services and basic IP routing to the network edge SMI installed upgradeable to advanced IP routing WS C3550 48 EMI 48 10 100...

Page 17: ...sia Saudi Arabia Scotland Singapore Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand Turkey Ukraine United Kingdom United States Venezuela Vietnam Zimbabwe Copyright 2005 Cisco Systems Inc All rights reserved CCSP CCVP the Cisco Square Bridge logo Follow Me Browsing and StackWise are trademarks of Cisco Systems Inc Changing the Way We Work Live Play and Learn and iQuick Stud...

Page 18: ... 2005 Cisco Systems Inc All rights reserved Important notices privacy statements and trademarks of Cisco Systems Inc can be found on cisco com Page 18 of 18 ...

Reviews: