Product Code: | |
Options: | |
Qty: | |
Unit Price: | £ |
If you wish to enquire about this product please contact us on
0800 488 0000
Features:
It allows limitation of broadcast traffic rate to cut down on unwanted network broadcast traffic.
It classifies traffic using multiple match criteria based on Layer 2, 3, and 4 information; applies QoS policies such as setting priority level and rate limit to selected traffic on a per-port or per-VLAN basis.
It supports the following congestion actions: strict priority (SP) queuing, weighted round robin (WRR), weighted fair queuing (WFQ), and WRED.
It enables read-only (operator) and read-write (manager) access on CLI and web browser management interfaces.
It leverages HWTACACS to link a custom list of CLI commands to an individual network administrator's login; also provides an audit trail.
It mirrors traffic from a switch port or to a remote switch port anywhere on the network, or mirrors ACL selected traffic to local switch port.
Automated device discovery protocol provides easy mapping by network management applications.
It segments traffic to and from management interfaces, including CLI/telnet, a Web browser interface, and SNMP.
It monitors cable between two switches and shuts down the ports on both ends if the cable is broken, preventing network problems such as loops.
Ingress and egress port monitoring enable network problem solving; virtual cable tests provide visibility into cable problems
It provides scalable ASIC-based wire-speed network monitoring and accounting with no impact on network performance; this allows network operators to gather a variety of sophisticated network statistics and information for capacity planning and real-time network monitoring purposes.
It mirrors ingress/egress ACL-selected traffic from a switch port or VLAN to a local or remote switch port anywhere on the network.
Future-proofs networking, as the switch is capable of being managed whether the attached network is running IPv4 or IPv6; supports pingv6, tracertv6, Telnetv6, TFTPv6, DNSv6, syslogv6, FTPv6, SNMPv6, DHCPv6, and RADIUS for IPv6.
It automatically adjusts for straight-through or crossover cables on all 10/100 and 10/100/1000 ports.
It supports up to 9216-byte frame size to improve performance of large data transfers.
Dual-personality ports for either 10/100/1000 or mini-GBIC SFP connectivity for increased connectivity flexibility.
It provides a Layer 2 link performance and fault detection monitoring tool, which reduces failover and network convergence times.
Up to 17.6 Gbps nonblocking switching fabric provides wire-speed switching with up to 13.1 million pps throughput.
Feature-rich ACL implementation helps ensure high levels of security and ease of administration without impacting network performance.
It keeps control separated from services and keeps service processing isolated; increases security and performance.
It allows a group of routers to dynamically back each other up to create highly available routed environments.
It simplifies the management of large IP networks and supports client and server; DHCP Relay enables DHCP operation across subnets.
It defines an address in Routing Information Protocol (RIP) and OSPF that can always be reachable, improving diagnostic capability.
It allows User Datagram Protocol (UDP) broadcasts to be directed across router interfaces to specific IP unicast or subnet broadcast addresses and prevents server spoofing for UDP services such as DHCP.
It provides more control during route redistribution; allow filtering and altering of route metrics.
It enables multiple equal-cost links in a routing environment to increase link redundancy and scale bandwidth.
It support IP Multicast address management and inhibition of DoS attacks.
It's used for inter-domain multicast applications, allowing multiple PIM-SM domains to interoperate.
It enables link connectivity monitoring and reduces network convergence time for RIP, OSPF, BGP, IS-IS, VRRP, and IRF.
It allows a smooth transition from IPv4 to IPv6 by encapsulating IPv6 traffic over an existing IPv4 infrastructure.
It provides IP Layer 2 to Layer 4 traffic filtering; supports VLAN ACL and port ACL.
It allows secure file transfer to and from the switch; protects against unwanted file downloads or unauthorized copying of a switch configuration file.
It's similar to IEEE 802.1X, it provides a browser-based environment to authenticated clients.
It allows access only to specified MAC addresses, which can be learned or specified by the administrator.
It secures and adds privacy, and prevents malicious attackers from obtaining user information.
It defeats ICMP denial-of-service attacks by enabling any switch port to automatically throttle ICMP traffic.
It blocks Bridge Protocol Data Units (BPDUs) on ports that do not require BPDUs, preventing forged BPDU attacks.
It blocks DHCP packets from unauthorized DHCP servers, preventing denial-of-service attacks.
It blocks ARP broadcasts from unauthorized hosts, preventing eavesdropping or theft of network data.
It eases switch management security administration by using a password authentication server.
It is an automated device discovery protocol that provides easy mapping of network management applications.
It is a standard extension that automatically configures network devices, including LLDP-capable IP phones.
It receives and recognizes CDP packets from Cisco's IP phones for seamless interoperation.
It automatically assigns VLAN and priority for IP phones, simplifying network configuration and maintenance.
It is used for inter-domain multicast applications, allowing multiple PIM-SM domains to interoperate.
It allows multiple VLANs to receive the same multicast traffic, reducing network bandwidth demand by eliminating multiple streams to each VLAN.
It uses the latest advances in silicon development and shuts off unused ports to improve power efficiency.
Features:
It allows limitation of broadcast traffic rate to cut down on unwanted network broadcast traffic.
It classifies traffic using multiple match criteria based on Layer 2, 3, and 4 information; applies QoS policies such as setting priority level and rate limit to selected traffic on a per-port or per-VLAN basis.
It supports the following congestion actions: strict priority (SP) queuing, weighted round robin (WRR), weighted fair queuing (WFQ), and WRED.
It enables read-only (operator) and read-write (manager) access on CLI and web browser management interfaces.
It leverages HWTACACS to link a custom list of CLI commands to an individual network administrator's login; also provides an audit trail.
It mirrors traffic from a switch port or to a remote switch port anywhere on the network, or mirrors ACL selected traffic to local switch port.
Automated device discovery protocol provides easy mapping by network management applications.
It segments traffic to and from management interfaces, including CLI/telnet, a Web browser interface, and SNMP.
It monitors cable between two switches and shuts down the ports on both ends if the cable is broken, preventing network problems such as loops.
Ingress and egress port monitoring enable network problem solving; virtual cable tests provide visibility into cable problems
It provides scalable ASIC-based wire-speed network monitoring and accounting with no impact on network performance; this allows network operators to gather a variety of sophisticated network statistics and information for capacity planning and real-time network monitoring purposes.
It mirrors ingress/egress ACL-selected traffic from a switch port or VLAN to a local or remote switch port anywhere on the network.
Future-proofs networking, as the switch is capable of being managed whether the attached network is running IPv4 or IPv6; supports pingv6, tracertv6, Telnetv6, TFTPv6, DNSv6, syslogv6, FTPv6, SNMPv6, DHCPv6, and RADIUS for IPv6.
It automatically adjusts for straight-through or crossover cables on all 10/100 and 10/100/1000 ports.
It supports up to 9216-byte frame size to improve performance of large data transfers.
Dual-personality ports for either 10/100/1000 or mini-GBIC SFP connectivity for increased connectivity flexibility.
It provides a Layer 2 link performance and fault detection monitoring tool, which reduces failover and network convergence times.
Up to 17.6 Gbps nonblocking switching fabric provides wire-speed switching with up to 13.1 million pps throughput.
Feature-rich ACL implementation helps ensure high levels of security and ease of administration without impacting network performance.
It keeps control separated from services and keeps service processing isolated; increases security and performance.
It allows a group of routers to dynamically back each other up to create highly available routed environments.
It simplifies the management of large IP networks and supports client and server; DHCP Relay enables DHCP operation across subnets.
It defines an address in Routing Information Protocol (RIP) and OSPF that can always be reachable, improving diagnostic capability.
It allows User Datagram Protocol (UDP) broadcasts to be directed across router interfaces to specific IP unicast or subnet broadcast addresses and prevents server spoofing for UDP services such as DHCP.
It provides more control during route redistribution; allow filtering and altering of route metrics.
It enables multiple equal-cost links in a routing environment to increase link redundancy and scale bandwidth.
It support IP Multicast address management and inhibition of DoS attacks.
It's used for inter-domain multicast applications, allowing multiple PIM-SM domains to interoperate.
It enables link connectivity monitoring and reduces network convergence time for RIP, OSPF, BGP, IS-IS, VRRP, and IRF.
It allows a smooth transition from IPv4 to IPv6 by encapsulating IPv6 traffic over an existing IPv4 infrastructure.
It provides IP Layer 2 to Layer 4 traffic filtering; supports VLAN ACL and port ACL.
It allows secure file transfer to and from the switch; protects against unwanted file downloads or unauthorized copying of a switch configuration file.
It's similar to IEEE 802.1X, it provides a browser-based environment to authenticated clients.
It allows access only to specified MAC addresses, which can be learned or specified by the administrator.
It secures and adds privacy, and prevents malicious attackers from obtaining user information.
It defeats ICMP denial-of-service attacks by enabling any switch port to automatically throttle ICMP traffic.
It blocks Bridge Protocol Data Units (BPDUs) on ports that do not require BPDUs, preventing forged BPDU attacks.
It blocks DHCP packets from unauthorized DHCP servers, preventing denial-of-service attacks.
It blocks ARP broadcasts from unauthorized hosts, preventing eavesdropping or theft of network data.
It eases switch management security administration by using a password authentication server.
It is an automated device discovery protocol that provides easy mapping of network management applications.
It is a standard extension that automatically configures network devices, including LLDP-capable IP phones.
It receives and recognizes CDP packets from Cisco's IP phones for seamless interoperation.
It automatically assigns VLAN and priority for IP phones, simplifying network configuration and maintenance.
It is used for inter-domain multicast applications, allowing multiple PIM-SM domains to interoperate.
It allows multiple VLANs to receive the same multicast traffic, reducing network bandwidth demand by eliminating multiple streams to each VLAN.
It uses the latest advances in silicon development and shuts off unused ports to improve power efficiency.