Data transmission
Packet buffer memory:
4 MB
Throughput:Rate at which data can be transferred.
35.7 Mpps
Switching capacity:The data transfer capacity of the switch per second.
48 Gbit/s
MAC address table:The MAC address is the 'Media Access Control Address'. It is a unique address given to a network interface controller (NIC) in a device. A MAC address table shows the addresses in a table format.
8000 entries
Design
Certification:
FCC 15 A, CE
LED indicators:
Activity, Fan fail, Link, PoE, Power, Power fail
Rack mounting:The type of mounting that can position devices in a shelving system (rack).
Logistics data
Harmonized System (HS) code:
85176990
Management features
MIB support:
RFC-1213, RFC-1493, RFC-1643, RFC-2863, RFC-2665, RFC-2819, RFC-2737, RFC-2618, RFC-3411
Web-based management:Using a website/web application to manage something.
Quality of Service (QoS) support:
Switch layer:A network switch is a computer networking device that links networking segments. A switch has different layers, such as layer 2 (a network bridge, operating at the data link layer, interconnecting a small number of devices) and layer 4 (can act as a firewall, amongst other things).
L2/L4
Switch type:What switch device has, managed or unmanaged.
Managed
Multicast features
Number of multicast groups filtered:
255
Multicast MAC address table:
4094 entries
Network
Virtual LAN features:
Private VLAN, Tagged VLAN, Protocol-based VLAN, Port-based VLAN
VLAN support:A Virtual Local Area Network (VLAN) consists of a group of computers and switches that can be physically distributed over different networks and buildings, but form one LAN on a logical level.
Auto MDI/MDI-X:A Medium Dependent Interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDIX) interface. Auto-MDIX ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDIX configuration to properly match the other end of the link.
MAC address auto-aging supported:
MAC address auto-learning supported:
Full duplex:A full-duplex system allows communication in both directions, and unlike half-duplex, allows this to happen simultaneously.
Copper ethernet cabling technology:
10BASE-T, 100BASE-T, 1000BASE-T
10G support:The product can use Oracle 10G, which is a database management system introduced in 2003.
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1D, IEEE 802.1Q, IEEE 802.1ab, IEEE 802.1p, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3af, IEEE 802.3at, IEEE 802.3u, IEEE 802.3x, IEEE 802.3z
Networking
Virtual LAN features:
Private VLAN, Tagged VLAN, Protocol-based VLAN, Port-based VLAN
VLAN support:A Virtual Local Area Network (VLAN) consists of a group of computers and switches that can be physically distributed over different networks and buildings, but form one LAN on a logical level.
Auto MDI/MDI-X:A Medium Dependent Interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDIX) interface. Auto-MDIX ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDIX configuration to properly match the other end of the link.
MAC address auto-aging supported:
MAC address auto-learning supported:
Full duplex:A full-duplex system allows communication in both directions, and unlike half-duplex, allows this to happen simultaneously.
Copper ethernet cabling technology:
10BASE-T, 100BASE-T, 1000BASE-T
10G support:The product can use Oracle 10G, which is a database management system introduced in 2003.
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1D, IEEE 802.1Q, IEEE 802.1ab, IEEE 802.1p, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3af, IEEE 802.3at, IEEE 802.3u, IEEE 802.3x, IEEE 802.3z
Optical fiber
Fiber ethernet cabling technology:
100BASE-LX, 100BASE-SX, 1000BASE-LX, 1000BASE-SX
Performance
Ports & interfaces
Fiber optic connector:This terminates the end of an optical fiber, and enables quicker connection and disconnection than splicing. The connectors mechanically couple and align the cores of fibers so light can pass. Better connectors lose very little light due to reflection or misalignment of the fibers. In all there have been about 100 types of optic fiber connectors produced.
MiniGBIC, SFP
Combo SFP ports quantity:
4
Basic switching RJ-45 Ethernet ports type:The type/category of basic switching RJ-45 Ethernet ports (sockets).
Gigabit Ethernet (10/100/1000)
Basic switching RJ-45 Ethernet ports quantity:The number of basic switching RJ-45 Ethernet ports (sockets).
20
Power
Power protection features:Features that protect the device against power problems e.g. overload.
Short circuit
AC input frequency:
50 - 60 Hz
AC input voltage:The voltage of the AC electricity that is inpitted into the product.
100 - 240 V
Power over Ethernet (PoE)
Total Power over Ethernet (PoE) budget:
440 W
Power over Ethernet (PoE) power per port:
30.8 W
Power over Ethernet (PoE) ports quantity:
24
Power over Ethernet (PoE):The device supports Power over Ethernet (PoE), which is one of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras.
Security
Authentication:
MAC-based authentication, Port-based authentication
BPDU filtering/protection:
Security algorithms:Security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks. The security algorithms supported are the ones that can be used with this product.
802.1x RADIUS, SNMP
Access Control List (ACL):