background image

G
i

g

a

b

i

t

 S

w
i

t

c

h

Gigabit Switch

RUB

TECH

Networking & Communications

R

L2 Plus Managed Switch 

Spanning Tree, VLAN, Port Trunking, 
Bandwidth Control, Port Security, SNMP/
RMON, IGMP Snooping capability via the 
intelligent software. It is suitable for both 
metro-LAN and office applications. 

   

    STP, you can configure the switches with a redundant backup bridge 
    path, so transmission and reception of packets can be guaranteed in 
    event of any fail-over switch on the network.

8 dual media  ports  for  flexible  fiber  connection

    8-Port dual media ports are provided for flexible fiber connection. You 
    can select to install optional transceiver modules in these slots for 
    short, medium or long distance fiber backbone attachment. Use of the 
    SFP will disable their corresponding built-in 10/100/1000Base-T 
    connections.

Broadcast/Multicast/unknown-unicast Storm  Control

    To limit too many broadcast/multicast/unknown-unicast flooding in the 
    network, broadcast/multicast storm control is used to restrict excess 
    traffic. Threshold values are available to control the rate limit for each 
    port. Packets are discarded if the count exceeds the configured upper 
    threshold.

IP-MAC-Port Binding

    The IP network layer uses a four-byte address. The Ethernet link layer
    uses a six-byte MAC address. Binding these two address types 
    together allows the transmission of data between the layers. The 
    primary purpose of IP-MAC binding is to restrict the access to a switch
    to a number of authorized users. Only the authorized client can access 
    the Switch's port by checking the pair of IP-MAC Addresses and port
    number with the pre-configured database. If an unauthorized user tries
    to access an IP-MAC binding enabled port, the system will block the 
    access by dropping its packet.

Access Control  List  (ACL)

    The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and 
    VLAN parameters etc. Here we will just go over the standard and 
    extended access lists for TCP/IP. As you create ACEs for ingress 
    classification, you can assign a policy for each port, the policy number
     is 1-8, however, each policy can be applied to any port. This makes it
     very easy to determine what type of ACL policy you will be working with.

Technical Specifications

Technical Specifications

Standard compliance

    

---IEEE 802.3 10Base-T Ethernet(twisted-pair copper)

    ---IEEE 802.3u 100Base-TX Ethernet(twisted-pair copper)
    ---IEEE 802.3ab 1000Base-TX Ethernet(twisted-pair copper)
    ---IEEE 802.3z 1000Base-X Ethernet
    ---IEEE 802.3x flow control capability
    ---ANSI/IEEE 802.3 auto-negotiation
    ---IEEE 802.1q VLAN

RoHS Compliance
Subscriber  Interface

    

---16-Port SFP + 8-Port Combo port (SFP/RJ-45)

    

---Port 1,2,3,4,5,6,7,8 are Gigabit TP/SFP Fiber auto sense

    ---Auto-Negotiation and Auto-MDIX
    ---Backpressure flow control for half duplex.
    ---802.3x flow control for full duplex.
    ---Connector: 16 SFP and 8 combo port, RJ-45/SFP

Performance

    

Switching capacity

---Non-blocking switch fabric supports up to 24GbE ports
---8 K MAC addresses 
---The maximum throughput is 48Gbps

    

VLAN

---Supports SVL/IVL configuration to meet your VLAN requirement
---Port-base VLAN
---IEEE802.1q tag-base VLAN, 4094 max, up to 1024 active VLANs

        including static plus dynamic entry

---IEEE802.1q tag-base VLAN

Содержание FGS-2924R

Страница 1: ... TOS IPv4 and UDP TCP application traffics The QoS operate at full wire speed The actual scheduling at each egress port can be based upon a strict priority weighted round robin or a mix of both Port Mirroring It is based on ACLfunction to classify the ingress traffic to do port copy This mechanism helps track network errors or abnormal packet transmission without interrupting the flow of data Allo...

Страница 2: ...ly the authorized client can access the Switch s port by checking the pair of IP MAC Addresses and port number with the pre configured database If an unauthorized user tries to access an IP MAC binding enabled port the system will block the access by dropping its packet Access Control List ACL The ACLs are divided into EtherTypes IPv4 ARPprotocol MAC and VLAN parameters etc Here we will just go ov...

Страница 3: ...oping including active and passive mode STP RSTP MSTP 802 1d 1w 1s Network Security 802 1x access control for port based and mac based authentication Management Access Policy Control Access control List IP mac port binding DHCP relay agent Snmpv1 v2c Network Management LED Description Network Interface Hardware Spec RFC 1213 MIB MIB II RFC 1757 RMON MIB Interface MIB Statistics Group 1 Address Tra...

Страница 4: ...heir respective owners Copyright c 2008 Ruby Tech Corp All rights reserved Carton Dimensions mm pcs Carton N W KG G W KG 530x512x345 5 18 5 Kg 19 5 Kg Packing Information Ordering Information Optional SFP Module Note FGS 2924R only supports the SFP transceiver from the following vendors 1 Ruby Tech Corporation 2 Agilient Technologies 3 AVAGOTechnologies 4 Finisar Corporation Packing Information Or...

Отзывы: