Datasheet

KEY FEATURES AND BENEFITS
Flexible and High-Capacity Solution
•24- and 48-port 10/100 Mbps and 10/100/1000 Mbps (RJ-45) non-Power over
Ethernet (PoE) models
•24- and 48-port 10/100 Mbps and 10/100/1000 Mbps (RJ-45) PoE models
•Efcientspace-saving1RUformfactorwithfront-facingdataportsandabuilt-in
temperature monitor sensor
•Field upgradeability to support Edge Layer 3 features
Robust Power over Ethernet
•Standards-based IEEE 802.3af PoE support
•PoE auto-detection enables support for PoE and non-PoE devices without
congurationchanges
•Software accessible system and per port power consumption
•Interoperability with popular VoIP equipment, including legacy IP phones
•Advanced QoS capabilities ensure high quality VoIP support
•LLDP-MED
IronShield Advanced Security
•Multilevel access security for console access
•IronShield 360°—System-wide, automated closed-loop threat detection and
mitigation solution
•Secure, Web-based management
•Secure Shell and SNMPv3 restrict and encrypt communications to the management
interface and system
•Terminal Access Controller Access Control Systems (TACACS/TACACS+) and RADIUS
operator authentication
•Secure Shell (SSHv2), SCP, and SNMPv3 secure remote management access and
communications
•MAClters,Layer3/Layer4ACLsandbindingtheACLtoTELNET,Webmanagementand
SNMP interface for secure management access
•IEEE 802.1x authentication including multiple device authentication and dynamic VLAN,
ACL,andMAClterassignmentforauthenticatedclients
•Private VLANs provide security and isolation between switch ports to help ensure that
userscannotsnooponotherusers’trafc
•Denial of Service Protection—Monitoring, throttling, and locking out of ICMP and TCP SYN
trafcbothtothemanagementaddressoftheswitchandfortransittrafc
•Man-in-the-Middle prevention using Dynamic ARP Inspection and DHCP Snooping
•Port Security and MAC Address Locking limits the number MAC addresses on a port. Using
PortSecuritynetworkmanagerscanallowspecicMACaddressesaccesstothenetwork
forspecictimeperiods
•MAC address authentication including multiple device authentication and dynamic policy
conguration
•Policy-controlled, MAC-based VLANs provide additional control of network access, allowing
for policy-controlled assignments of devices to Layer 2 VLANs