WebView Switches
Chapter 1: Introduction
Welcome
This guide covers five product models.
•SRW208 - 8-port 10/100 Ethernet Switch with WebView. Includes 8 10/100 RJ-45 ports.
•SRW208G - 8-port 10/100 Ethernet Switch with WebView and Expansion Slots. Includes 8 10/100 RJ-45 ports and 1 10/100/1000 RJ-45 port and 1 MiniGBIC slot.
•SRW208L - 8-port 10/100 Ethernet Switch with WebView and 100Base-LX Uplink Includes 8 10/100 RJ-45 ports and 1 MiniGBIC slot and 1 100LX Uplink port.
•SRW208MP - 8-port 10/100 Ethernet Switch with WebView and Maximum POE (Power over Ethernet) Includes 8 10/100 RJ-45 ports and 2 10/100/1000 RJ-45 ports and 2 shared MiniGBIC slots.
•SRW208P - 8-port 10/100 Ethernet Switch with WebView and POE (Power over Ethernet) Includes 8 10/100 RJ-45 ports and 2 10/100/1000 RJ-45 ports and 2 shared MiniGBIC slots.
For the purpose of this manual, whenever a feature applies to all models, the model number will be referenced as
SRW208x. If a specific model number is mentioned, then the feature is specific to that model.
The Linksys WebView Managed switch allows you to expand your network securely. Configuration of the switch is secured using SSL for Web access. User control is secured using 802.1x security using a RADIUS authentication mechanism and can also be controlled using MAC-based filtering.
Extensive QoS features makes the solution ideal for real-time applications like Voice and Video. The 4 priority queues together with the Weighted Round Robin and Strict Priority scheduling techniques facilitate efficient coexistence of real-time traffic with data traffic allowing them each to meet their QoS needs. Individual users or applications can be prioritized above others using various Class of Service options - by port, layer 2 priority (802.1p), and Layer 3 priority (TOS or DSCP). Intelligent Broadcast, and Multicast storm control minimizes and contain the effect of these types of traffic on regular traffic. IGMP Snooping limits bandwidth-intensive video traffic to only the requestors without flooding to all users. Incoming traffic can be policed and outgoing traffic can be shaped allowing you to control network access and traffic flow.