The industry’s first high-performance multi-core router
This series of routers is the first to be built on a multi-core, multi-threaded architecture. This architecture greatly improves performance, flexibility, and programmability, making it easier to use and enabling flexible Layer 4-7 functionality. Hardware acceleration helps security functions and other data link services process faster, allowing more processor resources to be allocated to mission-critical Layer 4-7 services.
Thanks to all these features, routers in this series are well suited for implementing new services in the future and can easily adapt to the configuration of a specific network.
Next generation network operating system
Support for multiple cores, symmetric multiprocessing (SMP), the Comware V7 platform, and independent processes enable dynamic loading and isolated updates. Extensive management capabilities help ensure system availability and performance.
The Comware V7 platform delivers the real-time performance required for core services by reserving specific dedicated processors for critical services . Priority scheduling ensures that processor resources are allocated to essential services in real time, even during periods of high computing load.
Comware V7 supports distributed computing features. Global protocols such as MPLS and BGP can be distributed across processors on different MPUs. Distributed computing provides high system performance.
Fully distributed processing architecture
Separate routing modules, service modules and switching modules , as well as the separation of the control plane from the data plane, guarantee uninterrupted provision of services when switching from the active MPU to the standby one. NAT, IPSec and NetStream services are handled independently by separate modules, which improves system performance and ensures high availability.
WAN IRF2
Intelligent Resilient Framework 2 (IRF2) technology virtualizes two SR6600 routers as a single device. IRF2 virtualization technology reduces network maintenance costs, simplifies configuration, and ensures greater utilization of channel bandwidth and device resources.
Channel aggregation across different devices provides load balancing and redundancy for multiple backbone connections. Various services can be applied to aggregated links, such as Quality of Service (QoS) management, NetStream flow analysis, Network Address Translation (NAT), and data encryption.
Patented stateful failover technology provides real-time redundancy and seamless Layer 3 forwarding for the control plane and data plane. Stateful failover improves the reliability and performance of the virtualized architecture, eliminates critical elements that could cause system failure, and ensures uninterrupted service delivery.
High port density and advanced aggregation capabilities
With RPE-X3 architecture and four-slot service modules, this series can accommodate up to 16 high-speed MIC-X interface modules, providing the best possible performance for WAN port aggregation among routers in this class.
Industry-leading encryption performance
All service modules for this series Features built-in hardware encryption for high performance IPSec processing. This ensures secure transmission of traffic across WANs and intranets without increasing costs.
Outstanding routing capabilities
Devices This series features large memory capacity for routing table entries, supporting multiple routing policies and advanced policy-based routing capabilities. Superior routing performance provides control and planning flexibility to meet a wide range of service requirements for carriers and large enterprises. SR6600 routers support static and dynamic routing protocols for IPv4 and IPv6, such as RIP/RIPng, OSPF/OSPFv3, IS-IS/IS-ISv6 and BGP/BGP4+.
Extensive VPN support functionality
Routers of this series support L2TP, IPsec, GRE protocols and are equipped with an independent encryption processor, which increases encoding performance and the throughput of tunnels necessary for organizing secure gateways. Thanks to these functions, data transmission security is implemented at no additional cost.
Traditional VPN virtual private networks are less flexible, because the access device cannot obtain the public IP address of the device at the other end of the tunnel during the registration process. In addition, traditional VPN solutions are more difficult to maintain because they require N2 connections to create a fully connected network. The routers of this series implement a solution of virtual private networks with automatic discovery (Auto Discovery Virtual Private Network, ADVPN). With ADVPN, VPN connections between branches can be established on access routers with dynamic IP addresses. ADVPN technology increases network flexibility and simplifies its maintenance. Additionally, ADVPN supports features such as NAT-T, security authentication, IPsec encryption, and multi-VPN domains.
To take the hassle out Due to the exponential growth in the number of IKE SAs and IPSec SAs, this series of routers uses the GDVPN mechanism, which offers a group-based IPSec model. GDVPN encapsulates a new IP header that matches the original IP header for packets in which the original IP header does not change, preserving the original routing structure and improving QoS performance. GDVPN creates connections without tunnels, encrypting multicast packets once instead of forwarding multicast packets to each neighboring device, which improves multicast efficiency.
SR6600 routers support MPLS capabilities such as L2VPN, L3VPN and MPLS TE, and can also interface with other router models to build high-performance and secure MPLS VPN solutions.
Comprehensive network security solution
n
In routers of this series, service security is implemented using FIP. FIP modules interface with RSE-X3 MPUs and Comware V7 software, taking over all the processing of traditional service modules, reducing costs and simplifying management.
The routers have the following built-in security features:
Firewall functions – packet filtering firewall, stateful firewall, attack packet filtering and filtering logging records. ACL acceleration algorithm minimizes the impact of ACL filtering on firewall performance.
Built-in attack protection features:
< p style="font-weight: 400;">Single packet attack protection – protects networks from single packet attacks such as Fraggle, ICMP redirect, ICMP unreachable host, LAND, large ICMP packets, route entries, smurf, source routes, TCP flags, Tracert and WinNuke.
Attack protection , aimed at scanning – prevents attackers from scanning IP addresses and ports of various hosts, protecting against finding out the topology and services used.
Protection against flooding attacks – protection from avalanche attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using the IMC UBAS solution. p>
Intelligent Bandwidth Management
In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.
Intelligent bandwidth management includes the following features:
Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
unreachable ICMP host, LAND, large ICMP packets, route entries, smurf, source routes, TCP flags, Tracert and WinNuke.
Protection against attacks aimed at scanning – prevents attackers from scanning IP addresses and ports of various hosts, protecting against finding out the topology and services used.
Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using the IMC UBAS solution. p>
Intelligent Bandwidth Management
In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.
Intelligent bandwidth management includes the following features:
Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
unreachable ICMP host, LAND, large ICMP packets, route entries, smurf, source routes, TCP flags, Tracert and WinNuke.
Protection against attacks aimed at scanning – prevents attackers from scanning IP addresses and ports of various hosts, protecting against finding out the topology and services used.
Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using the IMC UBAS solution. p>
Intelligent Bandwidth Management
In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.
Intelligent bandwidth management includes the following features:
Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
smurf, source routes, TCP flags, Tracert and WinNuke.
Protection against scanning attacks – prevents attackers from scanning the IP addresses and ports of various hosts, protecting against identifying the topology and services used.
Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering of attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using the IMC UBAS solution. p>
Intelligent Bandwidth Management
In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.
Intelligent bandwidth management includes the following features:
Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
smurf, source routes, TCP flags, Tracert and WinNuke.
Protection against scanning attacks – prevents attackers from scanning the IP addresses and ports of various hosts, protecting against identifying the topology and services used.
Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering of attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using the IMC UBAS solution. p>
Intelligent Bandwidth Management
In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.
Intelligent bandwidth management includes the following features:
Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
400;”>Protection against scanning attacks – prevents attackers from scanning IP addresses and ports of various hosts, protecting against identifying the topology and services used.
Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering packets of intruders by IP -source addresses. Allows you to drop attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using an IMC solution UBAS.
Intelligent bandwidth management
In networks organized on the main/backup principle, intelligent bandwidth management tools ability to redirect traffic to backup networks in accordance with policies when high load is detected on the main network.
Intelligent bandwidth management tools include the following functions: p>
Unequal cost multiple routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
400;”>Protection against scanning attacks – prevents attackers from scanning IP addresses and ports of various hosts, protecting against identifying the topology and services used.
Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering packets of intruders by IP -source addresses. Allows you to drop attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using an IMC solution UBAS.
Intelligent bandwidth management
In networks organized on the main/backup principle, intelligent bandwidth management tools ability to redirect traffic to backup networks in accordance with policies when high load is detected on the main network.
Intelligent bandwidth management tools include the following functions: p>
Unequal cost multiple routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
400;”>Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering attacker packets by source IP addresses. Allows you to discard attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using the IMC UBAS solution.
Intelligent bandwidth management
In networks organized according to the main/backup principle, Intelligent bandwidth management tools redirect traffic to backup networks according to policies when it detects high load on the primary network.
Intelligent bandwidth management tools include the following features:
Unequal Cost Multiple Routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
400;”>Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.
Blacklist functions – filtering attacker packets by source IP addresses. Allows you to discard attacker packets received from a specific source IP address.
User tracking – tracking user behavior based on logging and using the IMC UBAS solution.
Intelligent bandwidth management
In networks organized according to the main/backup principle, Intelligent bandwidth management tools redirect traffic to backup networks according to policies when it detects high load on the primary network.
Intelligent bandwidth management tools include the following features:
Unequal Cost Multiple Routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
400;”>User Tracking – Tracks user behavior based on logging and using the IMC UBAS solution.
Intelligent Bandwidth Management
In networks organized on a primary/backup basis, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the primary network.
Intelligent bandwidth management tools include the following features:
Unequal Cost Multiple Routing (UCMP) – manages bandwidth resource utilization with using weighting coefficients.Traffic is routed along routes depending on the bandwidth of the channel.
Bandwidth reservation and resource sharing – reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
400;”>User Tracking – Tracks user behavior based on logging and using the IMC UBAS solution.
Intelligent Bandwidth Management
In networks organized on a primary/backup basis, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the primary network.
Intelligent bandwidth management tools include the following features:
Unequal Cost Multiple Routing (UCMP) – manages bandwidth resource utilization with using weighting coefficients.Traffic is routed along routes depending on the bandwidth of the channel.
Bandwidth reservation and resource sharing – reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.
Traffic is routed along routes based on the channel’s capacity.
Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.
CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.
Carrier-grade availability
The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.
This series routers provide various high availability software features as listed in the following table.