Popis produktu :
Twenty 10/100/1000Base-T ports and four GE combo ports
Double hot swappable AC power supplies
Forwarding performance: 36 Mpps
Switching capacity: 256 Gbit/s
Powerful support for services
The S5700 supports IGMP v1/v2/v3 snooping, IGMP filter, IGMP fast leave, and IGMP proxy. It supports line-speed replication of multicast packets between VLANs, multicast load balancing among member interfaces of a trunk, and controllable multicast, meeting requirements for IPTV services and other multicast services.
The S5700 provides the Multi-VPN-Instance CE (MCE) function to isolate users in different VLANs on a device, ensuring data security and reducing costs.
Comprehensive reliability mechanisms
Besides STP, RSTP, and MSTP, the S5700 supports enhanced Ethernet reliability technologies such as Smart Link and RRPP, which implement millisecond-level protection switchover and ensure network reliability. It also provides Smart Link multi-instance and RRPP multi-instance to implement load balancing among links, optimizing bandwidth usage.
The S5700 supports enhanced trunk (E-Trunk) that enables a CE to be dual-homed to two PEs (S5700s). E-Trunk greatly enhances link reliability between devices and implements link aggregation and load balancing between devices. This improves reliability of access devices.
The S5700 supports the Smart Ethernet Protection (SEP) protocol, a ring network protocol applied to the link layer on an Ethernet network. SEP can be used on open ring networks and can be deployed on upper-layer aggregation devices to provide fast switchover (within 50 ms), ensuring non-stop transmission of services. SEP features simplicity, high reliability, fast switchover, easy maintenance, and flexible topology, facilitating network planning and management.
The S5700 supports redundant power supplies, and can use an AC power supply and a DC power simultaneously. Users can choose a single power supply or use two power supplies to ensure device reliability.
The S5700EI supports VRRP, and can set up VRRP groups with other Layer 3 switches. VRRP provides redundant routes to ensure stable and reliable communication. Multiple equal-cost routes to an uplink device can be configured on the S5700 to provide route redundancy. When an active route is unreachable, traffic is switched to a backup route.
The S5700 supports BFD, which provides millisecond-level fault detection for protocols such as OSPF, IS-IS, VRRP, and PIM to improve network reliability. Complying with IEEE 802.3ah and 802.1ag, the S5700 supports point-to-point Ethernet fault management and can detect faults in the last mile of an Ethernet link to users.
Well-designed QoS policies and security mechanisms
The S5700 implements complex traffic classification based on packet information such as the 5-tuple, IP preference, ToS, DSCP, IP protocol type, ICMP type, TCP source port, VLAN ID, Ethernet protocol type, and CoS. ACLs can be applied to inbound or outbound direction on an interface. The S5700 supports a flow-based two-rate three-color CAR. Each port supports eight priority queues and multiple queue scheduling algorithms such as WRR, DRR, SP, WRR+SP, and DRR+SP. All of these ensure the quality of voice, video, and data services.
The S5700 provides multiple security measures to defend against Denial of Service (DoS) attacks, and attacks against networks or users. DoS attack types include SYN Flood attacks, Land attacks, Smurf attacks, and ICMP Flood attacks. Attacks to networks refer to STP BPDU/root attacks. Attacks to users include bogus DHCP server attacks, man-in-the-middle attacks, IP/MAC spoofing attacks, DHCP request flood attacks. DoS attacks that change the CHADDR field in DHCP packets are also attacks against users.
The S5700 supports DHCP snooping, which generates user binding entries based on MAC addresses, IP addresses, IP address leases, VLAN IDs, and access interfaces of users. DHCP snooping discards invalid packets that do not match any binding entries, such as ARP spoofing packets and IP spoofing packets. This prevents man-in-the-middle attacks to campus networks that hackers initiate by using ARP packets. The interface connected to a DHCP server can be configured as a trusted interface to protect the system against bogus DHCP server attacks.
The S5700 supports strict ARP learning, which prevents ARP spoofing attacks that will exhaust ARP entries. It also provides IP source check to prevent DoS attacks caused by MAC address spoofing, IP address spoofing, and MAC/IP spoofing.
The S5700 supports centralized MAC address authentication, 802.1x authentication, and NAC. It authenticates users based on statically or dynamically bound user information such as the user name, IP address, MAC address, VLAN ID, access interface, and flag indicating whether antivirus software is installed. VLANs, QoS policies, and ACLs can be applied to users dynamically.
The S5700 can limit the number of MAC addresses learned on an interface to prevent attackers from exhausting MAC address entries by using bogus source MAC addresses. This function minimizes packet flooding that occurs when MAC addresses of users cannot be found in the MAC address table.
Easy deployment and maintenance free
The S5700 supports automatic configuration, plug-and-play, deployment using a USB flash drive, and batch remote upgrade. These capabilities simplify device management and maintenance and reduce maintenance costs. The S5700 supports SNMP v1/v2/v3 and provides flexible methods for managing devices. Users can manage the S5700 using the CLI, Web NMS, Telnet, and HGMP. The NQA function helps users with network planning and upgrades. In addition, the S5700 supports NTP, SSH v2, HWTACACS+, RMON, log hosts, and port-based traffic statistics.
The S5700 supports GVRP, which dynamically distributes, registers, and propagates VLAN attributes to reduce manual configuration workloads of network administrators and to ensure correct VLAN configuration. In a complex network topology, GVRP simplifies VLAN configuration and reduces network communication faults caused by incorrect VLAN configuration.
The S5700 supports MUX VLAN. MUX VLAN isolates Layer 2 traffic between interfaces in a VLAN. Interfaces in a subordinate separate VLAN can communicate with ports in the principal VLAN but cannot communicate with each other. MUX VLAN is usually used on an enterprise intranet to isolate user interfaces from each other but allow them to communicate with server interfaces. This function prevents communication between network devices connected to certain interfaces or interface groups but allows the devices to communicate with the default gateway.
Napriek všetkej snahe zaistiť čo najpresnejší popis, obrázky a technické parametre produktov, nemôžeme zaručiť, že uvedené informácie odpovedajú
skutočnosti. Rada výrobcov si vyhradzuje právo na zmenu niektorých parametrov, či vlastností bez predchadzajúceho upozornenia. Ak sa potrebujete
ubezpečiť o určitých parametroch produktu, alebo v prípade pochybností, kontaktujte nás. Neskoršie reklamácie vlastností sú
zbytočnou komplikáciou pre obe strany.
* * * * * * * * *
:: TOP 3 KATEGÓRIE v Internetovom Obchode MADER.sk - Račianska 66, 83102 Bratislava ::
Masážne prístroje a WELLNESS