Datasheet

IGS-4215-4P4T
5
IPv6/IPv4 Dual Stack Management
Supporting both IPv6 and IPv4 protocols, the IGS-4215-4P4T helps the system integrators to step in the IPv6 era with the lowest investment as its network
facilities need not be replaced or overhauled if the IPv6 network is set up.
Robust Layer 2 Features
The IGS-4215-4P4T can be programmed for advanced switch management functions such as dynamic port link aggregation, 802.1Q VLAN, Q-in-Q VLAN,
Multiple Spanning Tree Protocol (MSTP), Loop and BPDU Guard, IGMP Snooping, and MLD Snooping. Via the link aggregation, the IGS-4215-4P4T
allows the operation of a high-speed trunk to combine with multiple ports such as a 16Gbps fat pipe, and supports fail-over as well. Also, the Link Layer
Discovery Protocol (LLDP) is the Layer 2 protocol included to help discover basic information about neighboring devices on the local broadcast domain.
L2/L4
Managed Switch
L2/L4
Managed Switch
Q-in-Q
MSTP
MLD
LLDP
IGMP
QoS
LACP
Efcient Trafc Control
The IGS-4215-4P4T is loaded with robust QoS features and powerful traffic management to enhance services to business-class data, voice, and video
solutions. The functionality includes broadcast/multicast/unicast storm control, per port bandwidth control, 802.1p/CoS/IP DSCP QoS priority and
remarking. It guarantees the best performance in VoIP and video stream transmission, and empowers the enterprises to take full advantage of the limited
network resources.
Powerful Security
PLANET IGS-4215-4P4T offers comprehensive IPv4/IPv6 Layer 2 to Layer 4 Access Control List (ACL) for enforcing security to the edge. It can be used to
restrictnetworkaccessbydenyingpacketsbasedonsourceanddestinationIPaddress,TCP/UDPportsordenedtypicalnetworkapplications.Itsprotection
mechanism also comprises 802.1X port-based user and device authentication, which can be deployed with RADIUS to ensure the port level security and
block illegal users. With the protected port function, communication between edge ports can be prevented to guarantee user privacy. Furthermore, Port
security function allows to limit the number of network devices on a given port. The network administrators can now construct highly-secure corporate
networks with considerably less time and effort than before.