Ruby Tech FGS-2924R Switch User Manual


 
Gigabit Switch
Gigabit Switch
RUB
TECHTECH
Networking & Communications
R
L2 Plus Managed Switch
Spanning Tree, VLAN, Port Trunking,
Bandwidth Control, Port Security, SNMP/
RMON, IGMP Snooping capability via the
intelligent software. It is suitable for both
metro-LAN and office applications.
STP, you can configure the switches with a redundant backup bridge
path, so transmission and reception of packets can be guaranteed in
event of any fail-over switch on the network.
8 dual media ports for flexible fiber connection
8-Port dual media ports are provided for flexible fiber connection. You
can select to install optional transceiver modules in these slots for
short, medium or long distance fiber backbone attachment. Use of the
SFP will disable their corresponding built-in 10/100/1000Base-T
connections.
Broadcast/Multicast/unknown-unicast Storm Control
To limit too many broadcast/multicast/unknown-unicast flooding in the
network, broadcast/multicast storm control is used to restrict excess
traffic. Threshold values are available to control the rate limit for each
port. Packets are discarded if the count exceeds the configured upper
threshold.
IP-MAC-Port Binding
The IP network layer uses a four-byte address. The Ethernet link layer
uses a six-byte MAC address. Binding these two address types
together allows the transmission of data between the layers. The
primary purpose of IP-MAC binding is to restrict the access to a switch
to a number of authorized users. Only the authorized client can access
the Switch's port by checking the pair of IP-MAC Addresses and port
number with the pre-configured database. If an unauthorized user tries
to access an IP-MAC binding enabled port, the system will block the
access by dropping its packet.
Access Control List (ACL)
The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and
VLAN parameters etc. Here we will just go over the standard and
extended access lists for TCP/IP. As you create ACEs for ingress
classification, you can assign a policy for each port, the policy number
is 1-8, however, each policy can be applied to any port. This makes it
very easy to determine what type of ACL policy you will be working with.
Technical SpecificationsTechnical Specifications
Standard compliance
---IEEE 802.3 10Base-T Ethernet(twisted-pair copper)
---IEEE 802.3u 100Base-TX Ethernet(twisted-pair copper)
---IEEE 802.3ab 1000Base-TX Ethernet(twisted-pair copper)
---IEEE 802.3z 1000Base-X Ethernet
---IEEE 802.3x flow control capability
---ANSI/IEEE 802.3 auto-negotiation
---IEEE 802.1q VLAN
RoHS Compliance
Subscriber Interface
---16-Port SFP + 8-Port Combo port (SFP/RJ-45)
---Port 1,2,3,4,5,6,7,8 are Gigabit TP/SFP Fiber auto sense
---Auto-Negotiation and Auto-MDIX
---Backpressure flow control for half duplex.
---802.3x flow control for full duplex.
---Connector: 16 SFP and 8 combo port, RJ-45/SFP
Performance
Switching capacity
---Non-blocking switch fabric supports up to 24GbE ports
---8 K MAC addresses
---The maximum throughput is 48Gbps
VLAN
---Supports SVL/IVL configuration to meet your VLAN requirement
---Port-base VLAN
---IEEE802.1q tag-base VLAN, 4094 max, up to 1024 active VLANs
including static plus dynamic entry
---IEEE802.1q tag-base VLAN