|
Specification |
|
Fixed port |
24×10/100/1000Base-T, 4×1000Base-X SFP
|
|
MAC address table |
IEEE 802.1d compliance |
|
8K MAC address entries |
|
MAC address learning and aging |
|
Static, dynamic, and blackhole MAC address entries |
|
Packet filtering based on source MAC addresses |
|
VLAN |
4K VLANs |
|
Guest VLAN and voice VLAN, GVRP, MUX VLAN |
|
VLAN assignment based on MAC addresses, protocols, IP subnets, policies, and ports, QinQ, Selective QinQ |
|
1:1 and N:1 VLAN Mapping |
|
Reliability |
RRPP ring topology and RRPP multi-instance |
|
Smart Link tree topology and Smart Link multi-instance, providing the millisecond-level protection switchover |
|
SEP |
|
STP, RSTP, and MSTP |
|
BPDU protection, root protection, and loop protection |
|
IP routing |
Static routing |
|
IPv6 features |
IPv6 host |
|
Static IPv6 routes |
|
Path MTU (PMTU) |
|
IPv6 ping, IPv6 tracert, IPv4 and IPv6 dual stack |
|
ACLs based on the source IPv6 address, destination IPv6 address, Layer 4 ports, or protocol type
|
|
Multicast |
IGMP v1/v2/v3 snooping and IGMP fast leave |
|
MLD v1/v2 snooping, Multicast VLAN |
|
Multicast load balancing among member ports of a trunk |
|
Controllable multicast |
|
Port-based multicast traffic statistics |
|
QoS/ACL |
Rate limiting on packets sent and received by an interface |
|
Packet redirection |
|
Port-based traffic policing and two-rate three-color CAR |
|
Eight queues on each port |
|
WRR, DRR, SP, WRR+SP, and DRR+SP queue scheduling algorithms |
|
Re-marking of the 802.1p priority and DSCP priority |
|
Packet filtering at Layers 2 through 4, filtering out invalid frames based on the source MAC address, destination MAC address, source IP address, destination IP address, port number, protocol type, and VLAN ID |
|
Rate limiting in each queue and traffic shaping on ports |
|
Security |
User privilege management and password protection |
|
DoS attack defense, ARP attack defense, and ICMP attack defense |
|
Binding of the IP address, MAC address, interface, and VLAN |
|
Port isolation, port security, and sticky MAC |
|
Blackhole MAC address entries |
|
Limit on the number of learned MAC addresses |
|
802.1x authentication and limit on the number of users on an interface |
|
AAA authentication, RADIUS authentication, HWTACACS authentication, and NAC |
|
SSH v2.0 |
|
Hypertext Transfer Protocol Secure (HTTPS) |
|
CPU defense |
|
Blacklist and whitelist |
|
Access Security |
DHCP relay, DHCP server, DHCP snooping, and DHCP security |
|
Lightning protection
|
Service interface: 6 kV |
|
Super Virtual Fabric (SVF)
|
Working as an SVF client that is plug-and-play with zero configuration |
|
Automatically loading the system software package and patches of clients One-click and automatic delivery of service configurations
|
|
Supports independent running client |
|
Management and maintenance |
MAC Forced Forwarding (MFF) |
|
Virtual cable test |
|
Ethernet OAM (IEEE 802.3ah and 802.1ag)
|
|
SNMP v1/v2c/v3 |
|
RMON |
|
Web-based NMS |
|
NTP |
|
System logs and alarms of different levels |
|
802.3az EEE(Energy Efficient Ethernet) |
|
DLDP,sFlow |
|
Operating temperature |
0°C to 50°C |
|
Relative humidity |
5% to 95% (non-condensing)
|
|
Input voltage |
Rated voltage range: 100 V to 240 V AC, 50/60 Hz
Maximum voltage range: 90 V to 264 V AC, 50/60 Hz
|
|
Interoperability |
Supports VBST (Compatible with PVST/PVST+/RPVST)
Supports LNP (Similar to DTP)
Supports VCMP (Similar to VTP)
|
|
Dimensions
(W x D x H)
|
442 x 220 x 43.6 mm |
|
Power consumption
|
< 25W |