DCN switches - security, scalability and reliability


DCN switches why should you choose them? Learn about their key values.

1. Secure network

  •  The DCN switch software has a whole range of mechanisms implemented to support network architects and administrators, including the ability to block access to unauthorized devices, allowing only the connection of devices, with predefined by MAC addresses.
  • Effectively counter attacks with DHCP snooping.

2. Network easily scalable

  • switches without hidden costs in the form of additional licenses
  • non-blocking matrix will allow you to immediately and 100% utilize their functionality
  • you have a choice of models not only access but also aggregators with more SFP/SFP+/QSFP+ fiber ports and L2 and L3 functionality


3. Reliable network
•  Secure network traffic, build redundant networks.
Thanks to the protocols used in DCN switches, this is possible. Use Spanning Tree, among others, and prevent loops and traffic blockages in the network, quickly reconfigure the network with the open ERPS standard, build rings and quickly restore communications between key nodes with the MRPP protocol from DCN.

•  Choose tested solutions
DCN devices have been working for many years in private enterprises, public institutions: hospitals, schools, stadiums and government buildings throughout Europe.
You will find them, among others, in Energylandia (more than 300 DCN Ethernet switches) and in Polish schools (almost 2,000 units as part of the OSE project - National Educational Network) where they provide free and secure Internet access.



1. Secure network operation, user authentication

DCN switch software has a whole range of mechanisms implemented to support network architects and administrators:

  • Port Security - you will block access to unauthorized devices, allowing you to connect only devices, with MAC addresses predefined by you.
    When an intruder tries to get into our network, for example, by trying to connect his computer, the switch will respond immediately. How does this work? When an unauthorized device is connected to a switch port, the system recognizes this as suspicious activity. Then the switch automatically blocks traffic on that particular port, preventing the intruder from doing anything further.

 

  • VLAN port isolation - a function that limits communication between ports belonging to the same VLAN.
    With this mechanism, communication between devices connected to different ports in the same VLAN is possible, while communication between devices in different VLANs is blocked. When an intruder tries to access our network by connecting his computer to a switch port, VLAN port isolation can provide an additional layer of protection. If an unauthorized device is connected to a port in a particular VLAN, the switch can respond by isolating that port, preventing the intruder from accessing the rest of the network. This protects against unwanted network traffic, preventing potential attacks on the network infrastructure.

  • Loopback Detection - protection against loops
  • determine who can use various network elements and how, thanks to ACL (Access Control List)
  • detect and block host or MAC address impersonation attempts via DAI (Dynamic ARP Inspection)
  • effectively counter attacks - use DHCP snooping and assign a trusted DHCP server to a specific port, thereby blocking other servers from connecting.
  • limit communication between devices on the network on a common VLAN with Private VLAN you can effectively isolate and control individual devices on the network increasing its security.
    to protect your network you can also use: BPDU Filter /BPDU Guard/ Root Guard, RADIUS, TACAS+, Captive portal.

2.  Scalability
You are piling up network expansion in the future, choose switches that will not surprise you with additional costs in the form of additional licenses. DCN-branded devices have no license restrictions to block additional ports or functionality. In addition, their non-blocking matrix will allow you to immediately and 100% utilize their functionality. What's more, it works great as consecutive blocks in both access and aggregation networks. Used in fiber uplink with 1G SFP and 10G SFP+ speeds in access devices (s4600 and s5750E series) and 10G SFP+, 40G QSFP+ and even 100G QSFP28 in aggregation devices (s5750E, CS6200 and CS6500 series) thanks to which you can conveniently aggregate network traffic.
Reliability hidden in the functionality that gives you the ability to build a redundant network and confirmed in large-scale deployments.
DCN network devices are deployed in many private enterprises, public institutions: hospitals, schools, stadiums and government buildings throughout Europe.
More than 300 DCN Ethernet switches have been delivered to Energylandia, the largest amusement park in Central Europe, and nearly 2,000 units to schools in Poland as part of the OSE (Nationwide Educational Network) project, providing access to free and secure Internet.
The DCN brand has more than 5,000 employees, more than 1,100 engineers and more than 500 products building solutions for millions of businesses and consumers.

- Spanning Tree support - which allows switches to communicate along a single path and, in the event of a failure, automatically switch to an alternate path to avoid problems with excessive network traffic. And all this to the exclusion of the messy Broadcast storm effect, which could lead to significant network slowdown or even suspension.
- ERPS - an open standard that enables network reconfiguration in less than 50ms, its extension:
- MRPP - Multi-layer Ring Protection Protocol. Particularly used in networks with "ring" topology, it allows very fast restoration of communication between nodes in case of problems with link unavailability. DCN's proprietary protocol.
- VRRP - its task is to eliminate a single point of failure in the network in the context of static routes
- LACP - a network protocol that allows several physical ports to be combined behind each other into a single logical one
- VSF - a.k.a. stack, i.e. the creation of a single logical switch from several physical ones

 

3. Reliable and stable operation

  • Increased reliability and stable operation of the switch due to the possibility of using two redundant power supplies. In case of failure of one power supply or power outage from one source, the switch will receive power from the other power supply. The whole process of power surge does not affect your transmission, does not cause an interruption in transmission. The device reports the correct operation of power redundancy.
  • The compact monolithic housing increases the dustproofness of the device.
  • The hermetic design of the housing with IP40 protection class allows the switch to work stably in adverse conditions,
  • Surge protection of 6 kV protects the device from damage caused by possible power line failures.
  • Built with components characterized by higher quality and reliability to ensure higher MTBF (Mean Time Between Failure). The elimination of fans characterized by short lifespan and the use of passive heat dissipation through a specially designed monolithic housing, further enhances the reliability of the switch.
  • It dissipates heat brilliantly thanks to the use of an enclosure in the form of a heat sink. This type of housing allowed the elimination of a fan for its cooling, thus reducing the failure rate and power consumption of the switch.
  • Convenient installation thanks to DIN-rail mounts.
  • For your convenience, it does not require initial configuration and can operate right out of the box in a system called Plug & Play.
  • Low power consumption.