Customization: | Available |
---|---|
Communication Mode: | Full-Duplex & Half-Duplex |
Type: | Ethernet Switch |
Suppliers with verified business licenses
S5700S-28P-PWR-LI-AC Specifications |
|
Manufacturer |
HW |
Manufacturer Part Number |
S5700S-28P-PWR-LI-AC |
Form Factor |
Fixed, Stackable |
Switch Port |
24 GE POE ports, 4 GE SFP ports |
Power Over Ethernet (PoE) |
PoE+ |
Max Number of Stacks |
48Gbps |
DRAM Memory |
256 MB |
Flash Memory |
32 MB |
Performance |
|
Forwarding performance |
42 Mpps |
MAC address table |
IEEE 802.1d compliance |
16 K MAC address entries |
|
MAC address learning and aging |
|
Static, dynamic, and blackhole MAC address entries |
|
Packet filtering based on source MAC addresses |
|
VLAN |
4 K VLANs |
Reliability |
RRPP ring topology and RRPP multi-instance |
Smart Link tree topology and Smart Link multi-instance, providing the millisecond-level protection switchover |
|
SEP |
|
STP, RSTP, and MSTP |
|
BPDU protection, root protection, and loop protection |
|
E-Trunk |
|
IP routing |
Static routing, ECMP |
RIPv1, RIPv2 and RIPng |
|
IPv6 features |
Neighbor Discovery (ND) |
Path MTU (PMTU) |
|
IPv6 ping, IPv6 tracert, and IPv6 Telnet |
|
ACLs based on the source IPv6 address, destination IPv6 address, Layer 4 ports, or protocol type |
|
MLD v1/v2 snooping |
|
6to4 tunnel, ISATAP tunnel, and manually configured tunnel |
|
Multicast |
IGMP v1/v2/v3 snooping and IGMP fast leave |
Multicast forwarding in a VLAN and multicast replication between VLANs |
|
Multicast load balancing among member ports of a trunk |
|
Controllable multicast |
|
Port-based multicast traffic statistics |
|
QoS/ACL |
Rate limiting on packets sent and received by an interface |
Packet redirection |
|
Port-based traffic policing and two-rate three-color CAR |
|
Eight queues on each port |
|
WRR, DRR, SP, WRR+SP, and DRR+SP queue scheduling algorithms |
|
Re-marking of the 802.1p priority and DSCP priority |
|
Packet filtering at Layers 2 through 4, filtering out invalid frames based on the source MAC address, destination |
|
MAC address, source IP address, destination IP address, port number, protocol type, and VLAN ID |
|
Rate limiting in each queue and traffic shaping on ports |
|
Security |
User privilege management and password protection |
DoS attack defense, ARP attack defense, and ICMP attack defense |
|
Binding of the IP address, MAC address, interface, and VLAN |
|
Port isolation, port security, and sticky MAC |
|
Blackhole MAC address entries |
|
Limit on the number of learned MAC addresses |
|
802.1x authentication and limit on the number of users on an interface |
|
AAA authentication, RADIUS authentication, HWTACACS authentication, and NAC |
|
SSH v2.0 |
|
Hypertext Transfer Protocol Secure (HTTPS) |
|
CPU defense |
|
Blacklist and whitelist |