Cisco SG500X-48MP SG500X-48MP-K9-G5 データシート

製品コード
SG500X-48MP-K9-G5
ページ / 19
 
 
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 3 of 19 
Data Sheet 
Simplified IT Operation 
Cisco 500 Series switches help optimize your IT operations with built-in features that simplify and 
streamline day-to-day network operation: 
● 
True stacking allows you to troubleshoot, configure, and manage multiple physical switches as a single 
entity. 
● 
Unlike other stacking switches that require uniform configurations, the Cisco 500 Series allows you to 
mix Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet models in a single stack, providing total 
flexibility without sacrificing manageability. 
● 
Cisco switches use common chipsets/software across all switching portfolios, so all Cisco switches 
within a category support the same feature set 
– making it easier to manage and support all switches 
across the network. 
True Stacking 
Some switches claim to support stacking but in practice suppor
t only “clustering” – meaning that each 
switch must still be managed and configured individually. Cisco 500 Series switches provide true stacking 
capability, allowing you to configure, manage, and troubleshoot all switches in a stack as a single unit, 
with a single IP address. 
A true stack delivers a unified data and control plane, in addition to management plane, providing 
flexibility, scalability, and ease of use since the stack of units operate as a single entity constituting all the 
ports of the stack members. This capability can radically reduce complexity in a growing network 
environment while improving the resiliency and availability of network applications. True stacking also 
provides other cost savings and administrative benefits through features such as cross-stack QoS, 
VLANs, and port mirroring, which clustered switches can’t support. 
Strong Security 
Cisco 500 Series switches provide the advanced security features you need to protect your business data 
and keep unauthorized users off the network: 
● 
Embedded Secure Sockets Layer (SSL) encryption protects management data traveling to and from 
the switch. 
● 
Extensive access control lists (ACLs) restrict sensitive portions of the network to keep out unauthorized 
users and guard against network attacks. 
● 
Guest VLANs let you provide Internet connectivity to nonemployee users while isolating critical 
business services from guest traffic. 
● 
Support for advanced network security applications such as IEEE 802.1X port security tightly limits 
access to specific segments of your network. Web based authentication provides a consistent interface 
to authenticate all types of host devices and operating systems, without the complexity of deploying 
IEEE 802.1X clients on each endpoint. 
● 
Advanced defense mechanisms, including dynamic Address Resolution Protocol (ARP) inspection, IP 
Source Guard, and Dynamic Host Configuration Protocol (DHCP) snooping, detect and block deliberate 
network attacks. Combinations of these protocols are also referred to as IPMB (IP-MAC- port binding) 
● 
IPv6 First Hop Security extends the advanced threat protection to IPv6. This comprehensive security 
suite includes ND inspection, RA guard, DHCPv6 guard and neighbor binding integrity check, providing 
unparalleled protection against a vast range of address spoofing and man in the middle attack on 
IPv6 networks.