199

Cisco Supervisor Engine 32 - control processor - with Cisco Policy Feature

Mfg. Part: WS-SUP32-GE-3B | CDW Part: 2458811 | UNSPSC: 43201513
Request PricingCall
 

This item was discontinued on January 17, 2017.

Sales Assistance

800.972.3922 Mon-Fri 8am-6pm ET

Answer within 24 hours.



Close

Have leasing questions? Let us know how can we help.

Note: Leasing is available to businesses only. Leasing is not available to individuals.
800.972.3922
Mon-Fri 7am-7:30pm CT
Check Warehouse Availability ▼
 Close
Warehouse LocationAvailableQuantity Incoming
Inventory quantities are delayed by 15 minutes.
  • Control processor
  • 8 ports
  • GigE
  • plug-in module
  • with Cisco Policy Feature Card 3B PFC3B
  • for Catalyst 6500
  • 6503
View More
Product Overview
Main Features
  • Control processor
  • 8 ports
  • GigE
  • plug-in module
  • with Cisco Policy Feature Card 3B PFC3B
  • for Catalyst 6500
  • 6503
  • 6506
  • 6506-E
  • 6509
  • 6509-E
  • 6509-NEB
  • 6509-NEB-A
  • 6513
Cisco Systems introduces the Cisco Catalyst 6500 Series Supervisor Engine 32, the next generation of supervisor engine for the Cisco Catalyst 6500 Series of modular switches targeted for the wiring closet. Supervisor Engine 32, with Policy Feature Card 3B (PFC3B), extends core innovations to the network edge. Based on the industry-leading Cisco Catalyst 6500 Series Supervisor Engine 720 technology, the Cisco Catalyst 6500 Series Supervisor Engine 32 allows customers to cost-effectively enable hardware-based security features, such as denial of service (Dos) mitigation to protect network application performance, and scalable support for multicast applications at the network edge.

PFC3B offers CPU rate limiters, hardware-based MAC learning, and user-based rate limiting. It limits threats from the Dynamic Host Configuration Protocol (DHCP) server, default gateway, or end-user IP address-spoofing using features such as DHCP Snooping, Dynamic Address Resolution Protocol (ARP) Inspection, and IP Source Guard. The supervisor engine allows close control over the end with which users can access the network and what privileges they are granted through identity-based networking with IEEE 802.1x, port-based security, and port-based access lists. These integrated security features are hardware based and can be enabled concurrently without compromising system performance as traffic levels increase.

 
Adding to Cart...
11/23/2017 12:43:05 PM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.

Error!

Something went wrong.

Please try again later.