Datasheet

IGS-5225-8P4S/IGS-5225-8P2T2S/IGS-5225-8P2T4S
5
Robust Layer 2 Features
The IGS-5225 PoE Series can be programmed for advanced switch management functions such as dynamic port link aggregation, Q-in-Q VLAN, private
VLAN, Rapid Spanning Tree Protocol, Layer 2 to Layer 4 QoS, bandwidth control and IGMP snooping. The IGS-5225 PoE Series provides 802.1Q tagged
VLAN, and the VLAN groups allowed will be maximally up to 4K. Via aggregation of supporting ports, the IGS-5225 PoE Series allows the operation of a
high-speed trunk combining multiple ports. It enables a maximum of up to 10 trunk groups with 4 ports per trunk group, and supports fail-over as well.
Network with Cybersecurity Helps Minimize Security Risks
The IGS-5225 PoE Series comes with enhanced cybersecurity to fend off cyberthreats and cyberattacks. It supports SSHv2 and TLSv1.2 protocols to provide
strong protection against advanced threats. Served as a key point to transmit data to customer's critical equipment in a business network, the cybersecurity
feature of the IGS-5225 PoE Series protects the switch management and enhances the security of the mission-critical network without any extra deployment
cost and effort.
LACPMSTP
Q-in-Q LLDPQoS
MLD
IGMP
L2/L4
Managed Switch
L2/L4
Managed Switch
EfcientManagement
Forefcientmanagement,theIGS-5225PoESeriesisequippedwithCommandline,WebandSNMPmanagementinterfaces.
■Withthebuilt-inWeb-based management interface, the IGS-5225 PoE Series offers an easy-to-use, platform-independent management and
congurationfacility.
■For text-based management, it can be accessed via Telnet and the console port.
■Forstandard-basedmonitorandmanagementsoftware,itoffersSNMPv3connectionwhichencryptsthepacketcontentateachsessionforsecure
remote management.
SNMPv3
SSHv2
IGS-5225 Series
Powerful Security from Layer 2 to Layer 4
The IGS-5225 PoE Series offers comprehensive Layer 2 to Layer 4 Access Control List (ACL) for enforcing security to the edge. It can be used to restrict
network access by denying packets based on source and destination IP address, TCP/UDP ports or defined typical network applications. Its protection
mechanism also comprises 802.1x Port-based and MAC-based user and device authentication. With the private VLAN function, communication between
edge ports can be prevented to ensure user privacy.