| |
| L2+ |
|
|
Technical Specifications |
|
|
|
Product specifications |
|
| L2+ Managed |
|
|
|
|
MAC Address Table | 16K |
|
|
Aggregated Bandwidth | 108Gbps |
|
|
VLANs | Supports up to 4K VLAN Groups (port based, 802.1Q, GARP/GVRP, 802.1v protocol based |
|
|
Priority Queues | 8 Queues (802.1p/TOS/DiffServ) – Strict Priority or Weighted Round Robin Queue Scheduling |
|
|
Classification QoS/ACLs | Based on: MAC, IP, TCP/UDP, Payload, Port, DSCP, 802.1p |
Routing | 32 static routes |
|
|
Multicast Support | IGMP snooping, Multicast TV VLAN |
|
|
End to End Flow Control | Flow Control Across Packet Processors |
|
|
Link Aggregation Balancing | Based on MAC SA/DA, Based on IP SA/DA |
|
|
MAC Table Search | Search MAC/IP to reveal source Unit/Port |
|
|
IP to MAC binding | Display IP to MAC bindings |
|
|
Port Utilization | Measure Traffic, total port capacity |
|
|
Single Port Stacking | Chain Topology |
|
|
Trojan/DoS Attacks Prevention | MAC spoofing, IP spoofing |
|
|
Signature based detection | Illegal TCP/ICMP packet check, protocol checker, martian address check, well known DoS virus, TCP frame with source |
| port 1024 syn flag ON, Server Spoof, Stacheldraht Distribution DoS Attack Client, Invasor Trojan, Back Orifice Trojan |
Interface Options |
|
RJ-45
LC
CX-4
RPS
With Optional Standard Small
With Optional
Redundant Power Supply Via Optional
Wireless Switching
AP License
Max Allowed APs
WLAN Encryption
WLAN Security
Rogue AP Detection
Supported Roaming
802.11Support
Max Users per AP Wireless VLANs SSIDs
WLAN Management
Supports optional 10, 25 and 50 AP license
50 APs per switch or 50 APs per stack (with optional license)
WPA™, WPA2™, WEP (64 & 128 bit)
802.1x Authentication
Port Based & Radio Based
802.11a, 802.11b, 802.11g (based on supporting AP)
30 WLAN simultaneous users. 600 max per switch / stack
256
16 concurrent SSIDs per AP
HTTP, HTTPS, Telnet, SSH, SNMP