Specifications

14 ExtremeWare 7.3.1b3 Release Notes
Overview
Standard Multinetting
Multinetting provides a way of assigning multiple subnets to a routing interface. This benefits networks
that outgrow their allocated subnets. When the network grows due to a lack of address ranges in the
original subnet, a new subnet is allocated. In the Extreme Networks implementation, routing interfaces
can be assigned multiple subnets. IP routing occurs between the different subnets of the same interface,
as well as between the subnets of different interfaces.
PIM Snooping
In networks where a Layer 2 switch interconnects several routers, such as an Internet exchange point
(IXP), the switch floods IP multicast packets on all multicast router ports by default, even if there are no
multicast receivers downstream. With PIM snooping enabled, the switch restricts multicast packets for
each IP multicast group to only those multicast router ports that have downstream receivers joined to
that group. When you enable PIM snooping, the switch learns which multicast router ports need to
receive the multicast traffic within a specific VLAN by listening to the PIM hello messages, PIM join
and prune messages, and bidirectional PIM designated forwarder-election messages.
IP Address Security
CPU DoS Protect Enhancements
This feature allows you to manage and reduce high CPU utilization caused by an ICMP DOS attack. It
will also help your reduce or eliminate the impact of such attacks on switch performance.
SNMP Traps and MIBs for CPU DoS Protect
SNMP traps and MIBs provide access to the statistics available in the ExtremeWare Command Line
Interface (CLI).
IPDA Subnet Lookup
The Extreme Networks IPDA subnet lookup feature Increases IP address coverage in the hardware
forwarding table. It makes it possible for a switch to cover the entire IP address range, from A class to C
class, through setting the length of the IPDA subnet lookup mask. The expansion helps guarantee
wire-speed performance in a L3 switch for all ports.
It also offers better protection of internal traffic from malicious end-users or virus infected clients.
Scanning for virus-infected end users, or malicious users, can cause the FDB table to fill up quickly. The
attacks can significantly hurt the quality of internal traffic if all L3 forwarding is made by only host
lookup. The IPDA subnet lookup feature makes the attack traffic use the IPFDB subnet forwarding table
instead of the host forwarding table. This means that internal traffic, which uses the host forwarding
table can preserve the same quality when under attack.
sFlow
sFlow is a technology for monitoring traffic in data networks containing switches and routers. In
particular, it defines the sampling mechanisms implemented in an sFlow Agent for monitoring traffic,
the sFlow MIB for controlling the sFlow Agent, and the format of sample data used by the sFlow Agent
when forwarding data to a central data collector.