Datasheet
2
DATA SHEET — MOBILITY EXCHANGE
™
MXR-2
™
Reliability • Spanning tree and per-VLAN spanning tree (PVST+)
• Resilient network attachment via any MX port
• N:1 redundant MX capabilities
SECURITY
Authentication • Supports complete local AAA authentication, including 802.1x, as primary
or backup to a centralized AAA server
• Supports multiple AAA server groups and can load share across multiple
AAA servers or within a server group
• Generates and manages X.509 digital certificates
• Assigns and enforces per-user authorization policies that are managed
centrally from the AAA back-end
• Authorizations include virtual private group membership, personal firewall
filters, time-of-day/day-of-week access, encryption type, and location-
specific policies
• IEEE 802.1x with multiple EAP types (TLS, PEAP/MSCHAP, TTLS)
• WebAAA, MAC, Open
• WiFi WPA2 Enterprise certified
Encryption Key Management • Encryption distributed in Mobility Points
• MX generates master and session keys
• Provides key management for each encryption technique
Identity-based Networking • User credentials define access and network resource privileges
• Privileges and services follow users as they roam
• Maintains a user’s membership in the right virtual private group based on
the user’s authenticated identity
• Dynamically enables Virtual Private Groups to support roaming across
router boundaries
• Centralized management and control
Endpoint Assurance • Trusted Computing Group (TCG) - Trusted Network Connect (TNC)
compliant
Intrusion Detection and Protection • ActiveScan
™
rogue and denial-of-service (DoS) attack detection — Scan
all bands, associated channels and VLANs, while simultaneously providing
wireless connectivity to mobile clients
• SentryScan
™
— Scan the air nonstop on both bands and their associated
channel while other MPs support wireless LAN clients
• Rogue detection, Intrusion Detection System (IDS) and RF
countermeasures
• Trapeze/AirDefense integrated Intrusion Detection and Prevention
- Best in class IDS/IPS
- Common Trapeze MP hardware for sensor and service APs
- Dynamic threat management- convert MPs to sensors on demand
- Threat location and mitigation
MOBILITY SERVICES
Data Services • Data-intensive applications
• Latency-sensitive applications
Standards-based toll quality voice
service
• VoIP protocol support
• 802.11 e/WMM compliant
• Queuing and priority (802.11e/WMM)
• Preserve voice priority across network (802.11i PMK cache, WMM)
• Bandwidth control for voice (TSPEC)
• Maximize handset battery life (U-APSD)
• Neighbor report assisted roaming (802.11k)