3com Switch 7750 12-port 1000BASE-X with 4-port 10/100/1000BASE-T Module 3C168917 Data Sheet

Product codes
3C168917
Page of 12
3COM
®
SWITCH 7750 FAMILY
4
KEY BENEFITS
(CONTINUED)
PRIORITIZATION AND TRAFFIC MANAGEMENT
Eight priority queues per port enable standard IEEE 802.1p Class of
Service/Quality of Service (CoS/QoS). Protocol filtering and bandwidth
rate limiting capabilities allow the Switch 7750 to enforce port-based
controls for efficient use of network resources and prioritization of
business-critical or time-sensitive applications, including Voice over IP.
For example, protocols associated with key business applications can
receive prioritized, high-bandwidth service; while other protocols that
may be associated with non-critical (or even undesirable) applications 
can receive lower priority and/or bandwidth resources, or be blocked
completely.
STANDARDS BASED INTEROPERABILITY AND INVESTMENT
PROTECTION
Enterprises today rely on open standards-based technology solutions to
enable interoperability among new and existing systems and to ensure that
today’s investments will continue to provide value well into the future
without being locked-in to a particular vendor’s products or technology.
3Com has designed the Switch 7750 with an open architecture, facilitating
seamless growth and migration based on widely accepted international
standards, free from costly lock-ins and the restrictions of proprietary
approaches.
3Com’s standards-based design philosophy—inherent in the Switch 7750
and all other 3Com products—provides investment protection as well as
the flexibility to deploy best-in-class technology solutions which leverage
industry standards.
ENTERPRISE CLASS MANAGEMENT AND CONTROL
The Switch 7750 provides independent paths for data and management. A
dedicated data channel provides high-speed data switching and packet
forwarding, while a separate management channel provides control,
monitoring, route learning and distribution.
Comprehensive management capabilities provide enterprise-wide 
visibility and control to IT staff for configuration, network monitoring
and advanced troubleshooting.
Management features are accessible via an intuitive command line
interface (CLI), as well as by SNMP, with hierarchical access controls
and password protection for secure management access. Additional
management security is provided through user authentication and data
encryption capabilities of SNMP v3 and SSH v2, further helping prevent
unauthorized access or snooping of management traffic.