Certificates
Compliance certificates:
CE, Federal Communications Commission (FCC), RoHS
Certification
Compliance certificates:
CE, Federal Communications Commission (FCC), RoHS
Data transmission
Forwarding rate:
38.69 Mpps
Switching capacity:The data transfer capacity of the switch per second.
52 Gbit/s
MAC address table:The MAC address is the 'Media Access Control Address'. It is a unique address given to a network interface controller (NIC) in a device. A MAC address table shows the addresses in a table format.
8000 entries
Design
Number of fans:The quantity of fans (apparatus with rotating blades that creates a current of air for cooling or ventilation).
1 fan(s)
Rack mounting:The type of mounting that can position devices in a shelving system (rack).
Management features
Quality of Service (QoS) support:
Switch layer:A network switch is a computer networking device that links networking segments. A switch has different layers, such as layer 2 (a network bridge, operating at the data link layer, interconnecting a small number of devices) and layer 4 (can act as a firewall, amongst other things).
L2
Switch type:What switch device has, managed or unmanaged.
Managed
Multicast features
Multicast Listener Discovery (MLD) snooping:
v1/v2
Network
Virtual LAN features:
MAC address-based VLAN, Port-based VLAN, Private VLAN, Protocol-based VLAN, Voice VLAN
VLAN support:A Virtual Local Area Network (VLAN) consists of a group of computers and switches that can be physically distributed over different networks and buildings, but form one LAN on a logical level.
Ethernet LAN data rates:The different speed levels of the Ethernet LAN connection.
10,100,1000 Mbit/s
Copper ethernet cabling technology:
10BASE-T, 1000BASE-T
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1ad, IEEE 802.3i, IEEE 802.3u, IEEE 802.3z
Networking
Virtual LAN features:
MAC address-based VLAN, Port-based VLAN, Private VLAN, Protocol-based VLAN, Voice VLAN
VLAN support:A Virtual Local Area Network (VLAN) consists of a group of computers and switches that can be physically distributed over different networks and buildings, but form one LAN on a logical level.
Ethernet LAN data rates:The different speed levels of the Ethernet LAN connection.
10,100,1000 Mbit/s
Copper ethernet cabling technology:
10BASE-T, 1000BASE-T
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1ad, IEEE 802.3i, IEEE 802.3u, IEEE 802.3z
Operational conditions
Storage relative humidity (H-H):
5 - 95%
Operating relative humidity (H-H):
10 - 90%
Storage temperature (T-T):The minimum and maximum temperatures at which the product can be safely stored.
-40 - 70 °C
Operating temperature (T-T):The minimum and maximum temperatures at which the product can be safely operated.
0 - 40 °C
Optical fiber
Fiber ethernet cabling technology:
100BASE-X, 1000BASE-X
Packaging content
Quick start guide:Instructions, either online, as a computer program or in paper form, to allow you to set up and start using the product quickly.
Performance
Ports & interfaces
SFP module slots quantity:
18
Basic switching RJ-45 Ethernet ports type:The type/category of basic switching RJ-45 Ethernet ports (sockets).
Gigabit Ethernet (10/100/1000)
Basic switching RJ-45 Ethernet ports quantity:The number of basic switching RJ-45 Ethernet ports (sockets).
8
Power
AC input frequency:
50 - 60 Hz
AC input voltage:The voltage of the AC electricity that is inpitted into the product.
100 - 240 V
Power source:What is providing power for the product e.g. mains electricity.
AC
Protocols
IPv4 & IPv6 features:
Dual stack IPv4/IPv6, IPv6 Telnet, IPv6 ping, IPv6 tracert
Security
Authentication type:Authentification means proving identity to gain access to sometheng. There are various types of authentification exist e.g. access card, password, biometric data.
IEEE 802.1x, RADIUS, TACACS+
Queue scheduling algorithms:
Weighted Round Robin (WRR)
Security algorithms:Security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks. The security algorithms supported are the ones that can be used with this product.
HTTPS, SNMP, SNMPv2, SNMPv3
Access Control List (ACL) IPv6 entries:
1
Access Control List (ACL):
DHCP features:
DHCP Option 82, DHCP snooping
Weight & dimensions
Height:The measurement of the product from head to foot or from base to top.
180 mm
Depth:The distance from the front to the back of something.
44 mm
Width:The measurement or extent of something from side to side.
280 mm