Datasheet
KEY FEATURES AND BENEFITS
Flexible and High-Capacity Solution
•24- and 48-port 10/100 Mbps and 10/100/1000 Mbps (RJ-45) non-Power over
Ethernet (PoE) models
•24- and 48-port 10/100 Mbps and 10/100/1000 Mbps (RJ-45) PoE models
•Efcientspace-saving1RUformfactorwithfront-facingdataportsandabuilt-in
temperature monitor sensor
•Field upgradeability to support Edge Layer 3 features
Robust Power over Ethernet
•Standards-based IEEE 802.3af PoE support
•PoE auto-detection enables support for PoE and non-PoE devices without
congurationchanges
•Software accessible system and per port power consumption
•Interoperability with popular VoIP equipment, including legacy IP phones
•Advanced QoS capabilities ensure high quality VoIP support
•LLDP-MED
IronShield Advanced Security
•Multilevel access security for console access
•IronShield 360°—System-wide, automated closed-loop threat detection and
mitigation solution
•Secure, Web-based management
•Secure Shell and SNMPv3 restrict and encrypt communications to the management
interface and system
•Terminal Access Controller Access Control Systems (TACACS/TACACS+) and RADIUS
operator authentication
•Secure Shell (SSHv2), SCP, and SNMPv3 secure remote management access and
communications
•MAClters,Layer3/Layer4ACLsandbindingtheACLtoTELNET,Webmanagementand
SNMP interface for secure management access
•IEEE 802.1x authentication including multiple device authentication and dynamic VLAN,
ACL,andMAClterassignmentforauthenticatedclients
•Private VLANs provide security and isolation between switch ports to help ensure that
userscannotsnooponotherusers’trafc
•Denial of Service Protection—Monitoring, throttling, and locking out of ICMP and TCP SYN
trafcbothtothemanagementaddressoftheswitchandfortransittrafc
•Man-in-the-Middle prevention using Dynamic ARP Inspection and DHCP Snooping
•Port Security and MAC Address Locking limits the number MAC addresses on a port. Using
PortSecuritynetworkmanagerscanallowspecicMACaddressesaccesstothenetwork
forspecictimeperiods
•MAC address authentication including multiple device authentication and dynamic policy
conguration
•Policy-controlled, MAC-based VLANs provide additional control of network access, allowing
for policy-controlled assignments of devices to Layer 2 VLANs










