Next Generation Secure Data Center and Mobile Edge Leaf Switches
Introducing the Extreme 8520 switches for large scale BGP-EVPN IP Fabric enterprise data centers and service provider fixed and mobile edge architectures. As a part of Extreme’s Universal platform, the Extreme 8520 delivers scalable L2 and L3 services and deterministic network performance while simplifying deployment and reducing cost.
The Extreme 8520 platforms are top-of-rack, fixed form factor 1/10/25/40/100GbE leaf switches with 32MB of packet buffer and an overall non-blocking, in and out throughput of 2Tbps. There are two network hardware platforms, offering forty-eight 1/10/25 GbE SFP28 ports and either six or eight 100/40 GbE QSFP28 ports.
As part of Extreme’s Trusted Delivery initiative, the Extreme 8000 Series of Universal switches introduce powerful security enhancements with a combination of Secure Boot technology, enhanced by an industry-first Measured Boot implementation. Measured Boot extends the security posture of the system into the execution of the operating system itself for greater protection against threats.
The Extreme 8520 network hardware platforms enable organizations to design open networks that accommodate a variety of applications and east- west traffic patterns. With its high-density scale-out architecture, leading power efficiency, and airflow options, the Extreme 8520 platforms deliver cost-effective solutions that optimizes power, cooling, and data center space, wherever your center of data might be.
The 8520 delivers the high performance and reliability required by modern enterprises and service provider data centers. It is designed for high availability from both a software and hardware perspective, such as a clear separation between the control plane and data plane and redundant power supplies and fan modules.
The 8520 can run onboard VM-based applications alongside the switch OS – all without impacting performance. This flexible and open solution enables organizations to deploy Extreme-provided or third- party applications and tools directly on the switch for security, monitoring, troubleshooting or extended network functionality—based on customer need— without a separate hardware device. This unique design does not impact the control and forwarding plane of the switch and provides dedicated CPUs, memory and SSD storage for flexible packet capture and off-line processing.
The 8520 can be managed in a variety of ways. REST, NETCONF management interface or simple on- box management functions are delivered with CLI for manual configuration.
The 8520 runs Extreme SLX-OS, a fully virtualized Linux-based operating system that delivers process-level resiliency and fault isolation. SLX-OS supports advanced switching features and is highly programmable with support for REST APIs, Python, and NETCONF/RESTCONF. It is based on Linux, which offers all the advantages of open source and access to commonly used Linux tools. With enhanced support for Trusted Delivery features, such as Measured Boot and strong security defaults, Extreme SLX-OS continues to further protect against ever-growing security threats to infrastructure.
Extreme Fabric Automation simplifies and accelerates the deployment of the data center IP Fabric. The on-box application runs as a service on the Integrated Application Hosting environment within the SLX and uses industry- standard open API based programmable interfaces to provide the easiest way to deploy, provision and automate single or multiple data center IP Fabric networks in the fastest and most efficient way. Extreme Fabric Automation is also the point of integration for VMware vCenter, Microsoft Hyper V and OpenStack.
Trusted Delivery from Extreme Networks is designed to protect your key service delivery infrastructure at remote, often-unattended sites, as well as within colocation and data center environments where shared facility access is a concern. With Measured Boot – a security mechanism designed to verify the boot and runtime processes – Extreme Networks provides the capability to validate hardware components, boot process, and the operating system from factory to installation. Combined with remote attestation, where a trusted off-box challenger provides an objective measurement of trust, Measured Boot provides ongoing binary-level validation during operation.