Ruby Tech FGS-2924R Manual Do Utilizador

Página de 4
G
i
g
a
b
i
t
 S
w
i
t
c
h
Gigabit Switch
RUB
TECH
Networking & Communications
R
L2 Plus Managed Switch 
Spanning Tree, VLAN, Port Trunking, 
Bandwidth Control, Port Security, SNMP/
RMON, IGMP Snooping capability via the 
intelligent software. It is suitable for both 
metro-LAN and office applications. 
   
    STP, you can configure the switches with a redundant backup bridge 
    path, so transmission and reception of packets can be guaranteed in 
    event of any fail-over switch on the network.
8 dual media  ports  for  flexible  fiber  connection
    8-Port dual media ports are provided for flexible fiber connection. You 
    can select to install optional transceiver modules in these slots for 
    short, medium or long distance fiber backbone attachment. Use of the 
    SFP will disable their corresponding built-in 10/100/1000Base-T 
    connections.
Broadcast/Multicast/unknown-unicast Storm  Control
    To limit too many broadcast/multicast/unknown-unicast flooding in the 
    network, broadcast/multicast storm control is used to restrict excess 
    traffic. Threshold values are available to control the rate limit for each 
    port. Packets are discarded if the count exceeds the configured upper 
    threshold.
IP-MAC-Port Binding
    The IP network layer uses a four-byte address. The Ethernet link layer
    uses a six-byte MAC address. Binding these two address types 
    together allows the transmission of data between the layers. The 
    primary purpose of IP-MAC binding is to restrict the access to a switch
    to a number of authorized users. Only the authorized client can access 
    the Switch's port by checking the pair of IP-MAC Addresses and port
    number with the pre-configured database. If an unauthorized user tries
    to access an IP-MAC binding enabled port, the system will block the 
    access by dropping its packet.
Access Control  List  (ACL)
    The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and 
    VLAN parameters etc. Here we will just go over the standard and 
    extended access lists for TCP/IP. As you create ACEs for ingress 
    classification, you can assign a policy for each port, the policy number
     is 1-8, however, each policy can be applied to any port. This makes it
     very easy to determine what type of ACL policy you will be working with.
Technical Specifications
Technical Specifications
Standard compliance
    ---IEEE 802.3 10Base-T Ethernet(twisted-pair copper)
    ---IEEE 802.3u 100Base-TX Ethernet(twisted-pair copper)
    ---IEEE 802.3ab 1000Base-TX Ethernet(twisted-pair copper)
    ---IEEE 802.3z 1000Base-X Ethernet
    ---IEEE 802.3x flow control capability
    ---ANSI/IEEE 802.3 auto-negotiation
    ---IEEE 802.1q VLAN
RoHS Compliance
Subscriber  Interface
    ---16-Port SFP + 8-Port Combo port (SFP/RJ-45)
    ---Port 1,2,3,4,5,6,7,8 are Gigabit TP/SFP Fiber auto sense
    ---Auto-Negotiation and Auto-MDIX
    ---Backpressure flow control for half duplex.
    ---802.3x flow control for full duplex.
    ---Connector: 16 SFP and 8 combo port, RJ-45/SFP
Performance
    Switching capacity
---Non-blocking switch fabric supports up to 24GbE ports
---8 K MAC addresses 
---The maximum throughput is 48Gbps
    VLAN
---Supports SVL/IVL configuration to meet your VLAN requirement
---Port-base VLAN
---IEEE802.1q tag-base VLAN, 4094 max, up to 1024 active VLANs
        including static plus dynamic entry
---IEEE802.1q tag-base VLAN