Allied Telesis AT-8000GS/24POE Информация о продукте

Просмотреть онлайн или скачать pdf Информация о продукте для Сетевой маршрутизатор Allied Telesis AT-8000GS/24POE. Allied Telesis AT-8000GS/24POE 3 страницы. Layer 2 stackable gigabit power over ethernet switch
Также для Allied Telesis AT-8000GS/24POE: Информационный лист (4 страниц), Информационный лист (4 страниц), Информационный лист (3 страниц), Стекируемый гигабитный коммутатор Power Over Ethernet 2-го уровня (3 страниц)

Allied Telesis AT-8000GS/24POE Информация о продукте
Switches
product information
AT-8000GS/24POE
LAyEr 2 StAckAbLE GIGAbIt PoWEr ovEr EthErNEt SWItch
One of a series of high performance Gigabit Ethernet stackable
switches from Allied Telesis, the AT-8000GS/24POE provides high
performance Layer 2 switching in an affordable fixed configuration
platform combined with Power over Ethernet for edge devices
such as IEEE 802.11n access points, IP phones or IP cameras.
This switch offers 24 x 10/100/1000
ports, with four combo 1Gbps
SFP slots. Two integrated stacking
connectors deliver a total of 20Gbps
stacking bandwidth. The stacking
capability integrated into this platform
is configured as a resilient ring topology
designed to provide high reliability
and simplified management for higher
port density applications. Support for
jumbo Ethernet frames enables higher
throughput of time sensitive data.
Ideal Where Gigabit Power over
Ethernet is Needed
Powerful line rate performance and
stackability make this switch ideal for
branch offices or the wiring closet of
larger offices. The state-of-the-art QoS
capability of this product ensures
reliable delivery of advanced network
services such as voice while effectively
controlling the continually increasing
traffic needs found in today's networks.
Easy Access Networking
Featuring an industry standard CLI
and Allied Telesis' intuitive yet fully
featured Web interface the advanced
features of the AT-8000GS/24POE are
accessible to a wide range of system
administrators. The well known CLI
and Web interfaces significantly reduce
learning time and minimize the cost of
deployment.
alliedtelesis.com

Secure Management

Only authorized administrators can
access the management interface of
the 8000GS series. Protocols such as
SSL, SSH and SNMPv3 facilitate this
protection of your network with local or
remote connections.
Securing the Network Edge
To ensure the protection of your data, it
is important to control access to your

Key Features

Easy, Well Known Management
» » Industry»standard»CLI
» » Simple,»intuitive,»full»featured»Allied»Telesis»Web»
Interface
» » Secure,»encrypted»Web»and»CLI»management»with»
SSHv2»and»SSL»
» » SNMP
» » Two»levels»of»access»privileges
Power over Ethernet
» » Provides»standards-based»IEEE»802.3af
» » Power»over»Ethernet»to»all»24»10/100/1000»
Affordable, Truly Stackable 10/100/1000
Switching Platform
» » Single»IP»address»stack»management
» » 20»Gigabit»resilient»ring»stacking»architecture
» » Across»stack»link»aggregation
» » Across»stack»VLAN»configuration
» » Across»stack»port»mirroring
» » Redundant»standby»stack»master
All the QoS Needed in the Wiring Closet for
Today's Voice and Data Networking
» » Eight»priority»assigned»to»four»queues
» » IEEE»802.1p»for»Layer»2»QoS
» » DSCP»(DiffServ)»for»Layer»3»QoS
network. Protocols such as IEEE 802.1x
port-based authentication guarantee
that only known users are connected
to the network. Unknown users who
physically connect can be isolated to a
pre-determined part of your network
offering guests such benefits as Internet
access while ensuring the integrity of
your private network data.
» » IEEE»802.1p»to»DSCP»remarking»traffic»ready»for»
transport»to»the»Layer»3»core»of»the»network
» » Layer»2»and»Layer»3»Access»Control»List»(ACL)
Securing the Network at its
Most Vulnerable Point
» » IEEE»802.1x»and»RADIUS»network»login:»for»advanced»
control»for»user»authentication»and»accountability
» » Guest»VLAN:»to»ensure»visitors»or»unauthorized»
users»only»connect»to»services»defined»by»IT»such»as»
Internet»services
» » TACACS+:»for»ease»of»management»security»
administration
» » Layer»2»and»Layer»3»Access»Control»List»(ACL)
» » Port»MAC»address»security»options
Access Control Lists (ACLs)
» » Access»Control»Lists»enable»inspection»of»incoming»
frames»and»classify»them»based»on»various»criteria.»
Specific»actions»can»then»be»applied»to»these»frames»
in»order»to»more»effectively»manage»the»network»
traffic.»Typically»ACLs»are»used»as»a»security»
mechanism,»either»permitting»or»denying»entry»(hence»
the»name»Access»Control)»for»frames»in»a»group,»but»
ACLs»can»also»be»applied»to»QoS.»
»
Supported»ACL»types»are:»
-»IP»ACLs:»applicable»to»IP»packet»type.»All»»
»»classification»fields»are»related»to»IP»packets.»
-»MAC»ACLs:»classification»fields»are»based»on»Layer»»
»»2»fields.
%
+
Power Supply Efficiency