Allied Telesis AT-8000GS Switch Gigabit Power Over Ethernet impilabile di livello 2
Sfoglia online o scarica il pdf Switch Gigabit Power Over Ethernet impilabile di livello 2 per Router di rete Allied Telesis AT-8000GS. Allied Telesis AT-8000GS 3. Layer 2 stackable gigabit power over ethernet switch
Switches
product information
AT-8000GS/24POE
LAYER 2 STACKABLE GIGABIT POWER OVER ETHERNET SWITCH
One of a series of high performance Gigabit Ethernet stackable
switches from Allied Telesis, the AT-8000GS/24POE provides high
performance Layer 2 switching in an affordable fixed configuration
platform combined with Power over Ethernet for edge devices
such as IEEE 802.11n access points, IP phones or IP cameras.
This switch offers 24 x 10/100/1000
ports, with four combo 1Gbps
SFP slots. Two integrated stacking
connectors deliver a total of 20Gbps
stacking bandwidth. The stacking
capability integrated into this platform
is configured as a resilient ring topology
designed to provide high reliability
and simplified management for higher
port density applications. Support for
jumbo Ethernet frames enables higher
throughput of time sensitive data.
Ideal Where Gigabit Power over
Ethernet is Needed
Powerful line rate performance and
stackability make this switch ideal for
branch offices or the wiring closet of
larger offices. The state-of-the-art QoS
capability of this product ensures
reliable delivery of advanced network
services such as voice while effectively
controlling the continually increasing
traffic needs found in today's networks.
Easy Access Networking
Featuring an industry standard CLI
and Allied Telesis' intuitive yet fully
featured Web interface the advanced
features of the AT-8000GS/24POE are
accessible to a wide range of system
administrators. The well known CLI
and Web interfaces significantly reduce
learning time and minimize the cost of
deployment.
alliedtelesis.com
Secure Management
Only authorized administrators can
access the management interface of
the 8000GS series. Protocols such as
SSL, SSH and SNMPv3 facilitate this
protection of your network with local or
remote connections.
Securing the Network Edge
To ensure the protection of your data, it
is important to control access to your
Key Features
Easy, Well Known Management
» Industry standard CLI
» Simple, intuitive, full featured Allied Telesis Web
Interface
» Secure, encrypted Web and CLI management with
SSHv2 and SSL
» SNMP
» Two levels of access privileges
Power over Ethernet
» Provides standards-based IEEE 802.3af
» Power over Ethernet to all 24 10/100/1000
Affordable, Truly Stackable 10/100/1000
Switching Platform
» Single IP address stack management
» 20 Gigabit resilient ring stacking architecture
» Across stack link aggregation
» Across stack VLAN configuration
» Across stack port mirroring
» Redundant standby stack master
All the QoS Needed in the Wiring Closet for
Today's Voice and Data Networking
» Eight priority assigned to four queues
» IEEE 802.1p for Layer 2 QoS
» DSCP (DiffServ) for Layer 3 QoS
network. Protocols such as IEEE 802.1x
port-based authentication guarantee
that only known users are connected
to the network. Unknown users who
physically connect can be isolated to a
pre-determined part of your network
offering guests such benefits as Internet
access while ensuring the integrity of
your private network data.
» IEEE 802.1p to DSCP remarking traffic ready for
transport to the Layer 3 core of the network
» Layer 2 and Layer 3 Access Control List (ACL)
Securing the Network at its
Most Vulnerable Point
» IEEE 802.1x and RADIUS network login: for advanced
control for user authentication and accountability
» Guest VLAN: to ensure visitors or unauthorized
users only connect to services defined by IT such as
Internet services
» TACACS+: for ease of management security
administration
» Layer 2 and Layer 3 Access Control List (ACL)
» Port MAC address security options
Access Control Lists (ACLs)
» Access Control Lists enable inspection of incoming
frames and classify them based on various criteria.
Specific actions can then be applied to these frames
in order to more effectively manage the network
traffic. Typically ACLs are used as a security
mechanism, either permitting or denying entry (hence
the name Access Control) for frames in a group, but
ACLs can also be applied to QoS.
Supported ACL types are:
- IP ACLs: applicable to IP packet type. All
classification fields are related to IP packets.
- MAC ACLs: classification fields are based on Layer
2 fields.
%
+
Power Supply Efficiency