Allied Telesis AT-8000GS/24POE Informacje o produkcie
Przeglądaj online lub pobierz pdf Informacje o produkcie dla Router sieciowy Allied Telesis AT-8000GS/24POE. Allied Telesis AT-8000GS/24POE 3 stron. Layer 2 stackable gigabit power over ethernet switch
Również dla Allied Telesis AT-8000GS/24POE: Arkusz danych (4 strony), Arkusz danych (4 strony), Arkusz danych (3 strony), Gigabitowy przełącznik Power over Ethernet z możliwością łączenia w stosy w warstwie 2 (3 strony)
Switches
product information
AT-8000GS/24POE
LAyEr 2 StAckAbLE GIGAbIt PoWEr ovEr EthErNEt SWItch
One of a series of high performance Gigabit Ethernet stackable
switches from Allied Telesis, the AT-8000GS/24POE provides high
performance Layer 2 switching in an affordable fixed configuration
platform combined with Power over Ethernet for edge devices
such as IEEE 802.11n access points, IP phones or IP cameras.
This switch offers 24 x 10/100/1000
ports, with four combo 1Gbps
SFP slots. Two integrated stacking
connectors deliver a total of 20Gbps
stacking bandwidth. The stacking
capability integrated into this platform
is configured as a resilient ring topology
designed to provide high reliability
and simplified management for higher
port density applications. Support for
jumbo Ethernet frames enables higher
throughput of time sensitive data.
Ideal Where Gigabit Power over
Ethernet is Needed
Powerful line rate performance and
stackability make this switch ideal for
branch offices or the wiring closet of
larger offices. The state-of-the-art QoS
capability of this product ensures
reliable delivery of advanced network
services such as voice while effectively
controlling the continually increasing
traffic needs found in today's networks.
Easy Access Networking
Featuring an industry standard CLI
and Allied Telesis' intuitive yet fully
featured Web interface the advanced
features of the AT-8000GS/24POE are
accessible to a wide range of system
administrators. The well known CLI
and Web interfaces significantly reduce
learning time and minimize the cost of
deployment.
alliedtelesis.com
Secure Management
Only authorized administrators can
access the management interface of
the 8000GS series. Protocols such as
SSL, SSH and SNMPv3 facilitate this
protection of your network with local or
remote connections.
Securing the Network Edge
To ensure the protection of your data, it
is important to control access to your
Key Features
Easy, Well Known Management
» » Industry»standard»CLI
» » Simple,»intuitive,»full»featured»Allied»Telesis»Web»
Interface
» » Secure,»encrypted»Web»and»CLI»management»with»
SSHv2»and»SSL»
» » SNMP
» » Two»levels»of»access»privileges
Power over Ethernet
» » Provides»standards-based»IEEE»802.3af
» » Power»over»Ethernet»to»all»24»10/100/1000»
Affordable, Truly Stackable 10/100/1000
Switching Platform
» » Single»IP»address»stack»management
» » 20»Gigabit»resilient»ring»stacking»architecture
» » Across»stack»link»aggregation
» » Across»stack»VLAN»configuration
» » Across»stack»port»mirroring
» » Redundant»standby»stack»master
All the QoS Needed in the Wiring Closet for
Today's Voice and Data Networking
» » Eight»priority»assigned»to»four»queues
» » IEEE»802.1p»for»Layer»2»QoS
» » DSCP»(DiffServ)»for»Layer»3»QoS
network. Protocols such as IEEE 802.1x
port-based authentication guarantee
that only known users are connected
to the network. Unknown users who
physically connect can be isolated to a
pre-determined part of your network
offering guests such benefits as Internet
access while ensuring the integrity of
your private network data.
» » IEEE»802.1p»to»DSCP»remarking»traffic»ready»for»
transport»to»the»Layer»3»core»of»the»network
» » Layer»2»and»Layer»3»Access»Control»List»(ACL)
Securing the Network at its
Most Vulnerable Point
» » IEEE»802.1x»and»RADIUS»network»login:»for»advanced»
control»for»user»authentication»and»accountability
» » Guest»VLAN:»to»ensure»visitors»or»unauthorized»
users»only»connect»to»services»defined»by»IT»such»as»
Internet»services
» » TACACS+:»for»ease»of»management»security»
administration
» » Layer»2»and»Layer»3»Access»Control»List»(ACL)
» » Port»MAC»address»security»options
Access Control Lists (ACLs)
» » Access»Control»Lists»enable»inspection»of»incoming»
frames»and»classify»them»based»on»various»criteria.»
Specific»actions»can»then»be»applied»to»these»frames»
in»order»to»more»effectively»manage»the»network»
traffic.»Typically»ACLs»are»used»as»a»security»
mechanism,»either»permitting»or»denying»entry»(hence»
the»name»Access»Control)»for»frames»in»a»group,»but»
ACLs»can»also»be»applied»to»QoS.»
»
Supported»ACL»types»are:»
-»IP»ACLs:»applicable»to»IP»packet»type.»All»»
»»classification»fields»are»related»to»IP»packets.»
-»MAC»ACLs:»classification»fields»are»based»on»Layer»»
»»2»fields.
%
+
Power Supply Efficiency