DCN MRS-5950-XLK special cable for stack (DCRS-5950 series) 610301G5950-XLK 用户手册

产品代码
610301G5950-XLK
下载
页码 6
Digital China Networks Ltd. 
Digital Technology Plaza, NO.9 Shangdi 9
th
 Street, Haidian District, Beijing, China 
 
Tel: (8610) 82707033    Fax: (8610) 82705112
http://www.dcnetworks.com.cn/en
                           
                                       
 
                                                                                           
 
2 / 6 
IEEE 802.1w Rapid Spanning Tree Protocol provides a loop-free network and redundant 
links to the core network with rapid convergence. 
 
IEEE 802.1s Multiple Spanning Tree Protocol runs STP per VLAN base, providing L2 load 
sharing on redundant links. 
 
IEEE 802.3ad Link Aggregation Control Protocol (LACP) increases bandwidth by 
automatically aggregating several physical links together as a logical trunk and providing 
load balancing and fault tolerance for uplink connections. 
 
IGMP snooping prevents flooding of IP multicast traffic, and limits bandwidth intensive 
video traffic to only the subscribers. 
 
L3 Features 
The DCRS-5950 series switch delivers high-performance, hardware based IP routing. 
 
RIP v1/v2 and OSPF v2 provide dynamic routing by exchanging routing information with 
other Layer 3 switches and routers. 
 
DVMRP, PIM-DM and PIM-SM Multicast Routing Protocols send IP multicast traffic from 
one subnet to another. 
 
VRRP prevents your system from failing by dynamically backing up multiple L3 switches 
for routing.   
 
Comprehensive QoS 
8 queues per port enable differentiated management of up to 8 traffic types. 
 
Traffic is prioritized according to IEEE802.1p, DSCP, IP precedence and TCP/UDP port 
number, giving optimal performance to real-time applications such as voice and video.   
 
Bi-directional rate-limiting, per port or traffic class, preserves network bandwidth and 
allows full control of network resources.   
 
Enhanced Security 
IEEE 802.1X port-based access control and MAC-based access control ensure all users 
are authorized before being granted access to the network. 
 
Access Control Lists (ACLs) can be used to restrict access to sensitive network resources 
by denying packets based on L2/L3/L4 headers information. 
 
Secure Shell (SSH) encrypts network management information via Telnet providing 
secure network management.