Cisco Catalyst 2960-8TC-S WS-C2960-8TC-S Hoja De Datos
Los códigos de productos
WS-C2960-8TC-S
Data Sheet
© 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 12
Configurations
Table 1 shows the Cisco Catalyst 2960 LAN Lite Series configurations.
Table 1.
Switch Configurations
Part Number
Product Description
Cisco Catalyst 2960-8TC-S
8 Ethernet 10/100 ports and 1 dual-purpose uplink port
Cisco Catalyst 2960-24-S
24 Ethernet 10/100 ports
Cisco Catalyst 2960-24TC-S
24 Ethernet 10/100 ports and 2 dual-purpose uplink ports (10/100/1000BASE-T or SFP)
Cisco Catalyst 2960-48TT-S
48 Ethernet 10/100 ports and 2 fixed 10/100/1000 uplink ports
Cisco Catalyst 2960-48TC-S
48 Ethernet 10/100 ports and 2 dual-purpose uplink ports
The SFP-based Gigabit Ethernet ports accommodate Cisco 1000BASE-SX, 1000BASE-LX, and
100BASE-FX SFP transceivers.
Primary Features and Benefits
Security
The Cisco Catalyst 2960 LAN Lite Switches support security features that can help your business
protect important information, keep unauthorized people off the network, guard privacy, and
maintain uninterrupted operation.
The Cisco Identity-Based Networking Services (IBNS) solution provides authentication, access
control, and security policy administration to secure network connectivity and resources. Cisco
IBNS in the Cisco Catalyst 2960 LAN Lite Series prevents unauthorized access and helps ensure
that users get only their designated privileges.
With Cisco IBNS you can dynamically administer granular levels of network access. Using the
802.1x standard and the Cisco Secure Access Control Server (ACS), you can assign users a
VLAN upon authentication, regardless of where they connect to the network. This setup allows
your IT department to enable strong security policies without compromising user mobility, and with
minimal administrative overhead.
You can use port security to limit access on an Ethernet port based on the MAC address of the
device to which it is connected. You also can use it to limit the total number of devices plugged
into a switch port, thereby protecting the switch from a MAC flooding attack as well as reducing the
risks of rogue wireless access points or hubs.
You can use the MAC Address Notification feature to monitor the network and track users by
sending an alert to a management station so that your network administrators know when and
where users entered the network. Secure Shell Protocol Version 2 (SSHv2) and SNMPv3 encrypt
administrative and network-management information, protecting your network from tampering or
eavesdropping. TACACS+ or RADIUS authentication enables centralized access control of
switches and restricts unauthorized users from altering the configurations. Alternatively, you can
configure a local username and password database on the switch itself. Fifteen levels of
authorization on the switch console and two levels on the web-based management interface allow
you to give different levels of configuration capabilities to different administrators.