(V3) Datasheet
IGS-10020HPT
7
Robust Layer 2 Features
The IGS-10020HPT can be programmed for advanced switch management functions such as dynamic port link aggregation, Q-in-Q VLAN, private VLAN,
Rapid Spanning Tree Protocol, Layer 2 to Layer 4 QoS, bandwidth control and IGMP snooping. The IGS-10020HPT provides 802.1Q tagged VLAN, and
the VLAN groups allowed will be maximally up to 255. Via aggregation of supporting ports, the IGS-10020HPT allows the operation of a high-speed trunk
combining multiple ports. It enables a maximum of up to 5 trunk groups with 2 ports per trunk group, and supports fail-over as well.
LACPMSTP
Q-in-Q LLDPQoS
MLD
IGMP
L2/L4
ManagedSwitch
L2/L4
ManagedSwitch
Efcient Secure Management
For efcient management, the IGS-10020HPT is equipped with console, Web and SNMP management interfaces. With the built-in Web-based management
interface, the IGS-10020HPT offers an easy-to-use, platform-independent management and configuration facility. For text-based management, the IGS-
10020HPT can be accessed via Telnet and the console port. Moreover, it also offers secure remote management via any standard-based management
software by supporting SNMPv3 connection which encrypts the packet content at each session.
01010101010110010101010100010101010
01010101010110010101010100010101010
01010101010110010101010100010101010
SNMP
v
3
SSH
SSL
Computer
Powerful Security
The IGS-10020HPT offers comprehensive Layer2toLayer4AccessControlList(ACL) for enforcing security to the edge. It can be used to restrict
network access by denying packets based on source and destination IP address, TCP/UDP ports or defined typical network applications. Its protection
mechanism also comprises 802.1xPort-based and MAC-based user and device authentication. With the private VLAN function, communication between
edge ports can be prevented to ensure user privacy. The network administrators can now construct highly-secure corporate networks with considerably less
time and effort than before.
Cybersecurity Network Solution to Minimize Security Risks
The cybersecurity features that virtually need no effort and cost to have included the protection of the switch management and the enhanced security of the
mission-critical network. Both SSH and SSL protocols are utilized to provide strong protection against advanced threats. The network administrator can now
construct highly-secure corporate networks with considerably less time and effort than before.
Flexibility and Extension Solution
The additional two mini-GBIC slots built in the IGS-10020HPT support dual speed, 100BASE-FX and 1000BASE-SX/LX SFP (Small Form-factor Pluggable)
fiber-optic modules, meaning the administrator now can flexibly choose the suitable SFP transceiver according to not only the transmission distance but
also the transmission speed required. The distance can be extended from 550 meters to 2km (multi-mode ber) and to 10/20/30/40/50/60/70/120 kilometers
(single-mode ber or WDM ber). They are well suited for applications within the enterprise data centers and distributions.