Data transmission
Packet buffer memory:
4.1 MB
Throughput:Rate at which data can be transferred.
26.79 Mpps
Switching capacity:The data transfer capacity of the switch per second.
36 Gbit/s
MAC address table:The MAC address is the 'Media Access Control Address'. It is a unique address given to a network interface controller (NIC) in a device. A MAC address table shows the addresses in a table format.
8000 entries
Design
Certification:
FCC 15 A, CE
IEC 60068-2-32, IEC 60068-2-27, IEC 60068-2-6
International Protection (IP) code:The IP code classifies and rates the degree of protection provided against the intrusion (including body parts such as hands and fingers), dust, accidental contact, and water by mechanical casings and electrical enclosures. It is published by the International Electrotechnical Commission (IEC). The digits (characteristic numerals) indicate conformity with the conditions summarized in the tables below. Where there is no protection rating with regard to one of the criteria, the digit is replaced with the letter X. an electrical socket rated IP22 is protected against insertion of fingers and will not be damaged or become unsafe during a specified test in which it is exposed to vertically or nearly vertically dripping water. Another example is the Sony Xperia Z Ultra, one of the first cellular phones to be IP-rated; it is rated at IP58 and marketed as "dust resistant" and can be "immersed in 1.5 meter of freshwater for up to 30 minutes".
IP30
Wall mountable:The product can be mounted on (attached to ) a wall.
Management features
MIB support:
RFC 1213 MIB-II, RFC 1493, RFC 1643, RFC 2863, RFV 2665, RFC 2819, RFC 2737, RFC 2618, RFC 2863, RFC 2933, RFC 3411, RFC 4292, RFC 4836
Web-based management:Using a website/web application to manage something.
Quality of Service (QoS) support:
Switch layer:A network switch is a computer networking device that links networking segments. A switch has different layers, such as layer 2 (a network bridge, operating at the data link layer, interconnecting a small number of devices) and layer 4 (can act as a firewall, amongst other things).
L2/L4
Switch type:What switch device has, managed or unmanaged.
Managed
Multicast features
Network
Virtual LAN features:
Private VLAN, Stacked VLAN, Tagged VLAN, Voice VLAN
VLAN support:A Virtual Local Area Network (VLAN) consists of a group of computers and switches that can be physically distributed over different networks and buildings, but form one LAN on a logical level.
Auto MDI/MDI-X:A Medium Dependent Interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDIX) interface. Auto-MDIX ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDIX configuration to properly match the other end of the link.
Full duplex:A full-duplex system allows communication in both directions, and unlike half-duplex, allows this to happen simultaneously.
10G support:The product can use Oracle 10G, which is a database management system introduced in 2003.
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1D, IEEE 802.1Q, IEEE 802.1ab, IEEE 802.1p, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3az, IEEE 802.3u, IEEE 802.3x, IEEE 802.3z
Networking
Virtual LAN features:
Private VLAN, Stacked VLAN, Tagged VLAN, Voice VLAN
VLAN support:A Virtual Local Area Network (VLAN) consists of a group of computers and switches that can be physically distributed over different networks and buildings, but form one LAN on a logical level.
Auto MDI/MDI-X:A Medium Dependent Interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDIX) interface. Auto-MDIX ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDIX configuration to properly match the other end of the link.
Full duplex:A full-duplex system allows communication in both directions, and unlike half-duplex, allows this to happen simultaneously.
10G support:The product can use Oracle 10G, which is a database management system introduced in 2003.
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1D, IEEE 802.1Q, IEEE 802.1ab, IEEE 802.1p, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3az, IEEE 802.3u, IEEE 802.3x, IEEE 802.3z
Operational conditions
Heat dissipation:The heat generated by the power supply.
51.2 BTU/h
Operating relative humidity (H-H):
5 - 95%
Storage temperature (T-T):The minimum and maximum temperatures at which the product can be safely stored.
-40 - 85 °C
Operating temperature (T-T):The minimum and maximum temperatures at which the product can be safely operated.
-40 - 75 °C
Performance
Ports & interfaces
SFP module slots quantity:
2
Basic switching RJ-45 Ethernet ports type:The type/category of basic switching RJ-45 Ethernet ports (sockets).
Gigabit Ethernet (10/100/1000)
Basic switching RJ-45 Ethernet ports quantity:The number of basic switching RJ-45 Ethernet ports (sockets).
16
Power
Power consumption (max):The maximum amount of power used by the device.
15 W
DC input voltage:
12 - 48 V
Power over Ethernet (PoE)
Power over Ethernet (PoE):The device supports Power over Ethernet (PoE), which is one of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras.
Protocols
GARP VLAN Registration Protocol (GVRP):
Security
Authentication:
Port-based authentication
BPDU filtering/protection:
MAC address filtering:Security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.
Security algorithms:Security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks. The security algorithms supported are the ones that can be used with this product.
SNMPv3, SSH, SSH-2, SSL/TLS
Access Control List (ACL):
Weight & dimensions
Weight:Weight of the product without packaging (net weight). If possible, the net weight is given including standard accessories and supplies. Please note that sometimes the manufacturer leaves out the weight of accessories and/or supplies.
813 g
Height:The measurement of the product from head to foot or from base to top.
152 mm
Depth:The distance from the front to the back of something.
107 mm
Width:The measurement or extent of something from side to side.
66 mm