R
RUB
Networking & Communications
TECHTECH
FGS-2924R
Gigabit Switch
L2 Plus Managed Switch
Gigabit Switch
FGS-2924R:
16-Port SFP + 8-Port Combo GbE L2 Plus Managed Switch
Key FeaturesKey Features
24-Port Gigabit SFP High Port Count
Fiber Switch
9KB Jumbo Frame Support
IEEE 802.1x Access Control Improve
Network Security
Port Mirroring Helps Supervisor
Monitoring Network
Q-in-Q VLAN for performance & security
and 4094 Vlan entries(prevision,
upgrade via FW)
IEEE 802.1D Compatible, 802.1w Rapid
Spanning Tree and 802.1s Multiple
Spanning Tree
Unknown Unicast/Broadcast/Multicast
Storm Control
Multicast Vlan Management for IPTV
IP-Mac-Port binding for LAN security
QCL Based on Application traffic for QoS
and rate limitation management
ACL Based on Ethernet Type / ARP /
IPv4 for packets permit or deny, rate
limitation and port copy
DHCP Option 82 relay agent
Overview
FGS-2924R, a 24-port Gigabit L2 Plus
Managed Switch, is a standard switch that
meets all IEEE 802.3/u/x/z Gigabit, Fast
Ethernet specifications. The switch
includes 16-Port 1000Mbps SFP and
8-Port Combo Gigabit TP/SFP Fiber dual
media management Ethernet switch. The
switch can be managed through RS-232
serial port, or through Ethernet port using
CLI or Web-based management unit,
associated with SNMP agent. With the
SNMP agent, the network administrator
can logon the switch to monitor, configure
and control each port's activity in a friendly
way. The overall network management is
enhanced and the network efficiency is
also improved to accommodate high
bandwidth applications. In addition, the
switch features comprehensive and useful
functions such as QoS (Quality of Service),
QoS with four priority queues
The QoS(Quality Of Service) Control List (QCL) feature provides four
internal queues to support four different classifications of traffic. High
priority packet streams experience less delay inside the switch, which
supports lower latency for certain delay-sensitive traffic. The
FGS-2924R can classify the packet as one of the four priorities
according to vip port, 802.1p priority tag, DiffServ and/or IP TOS, IPv4
and UDP/TCP application traffics. The QoS operate at full wire speed.
The actual scheduling at each egress port can be based upon a strict
priority, weighted round robin or a mix of both.
Port Mirroring
It is based on ACL function to classify the ingress traffic to do port copy.
This mechanism helps track network errors or abnormal packet
transmission without interrupting the flow of data. Allow ingress traffic
to be monitored by a single port that is defined as mirror capture port.
The mirror capture port can be any 10/100 port, 10/100/1000 port.
Mirroring multiple ports is possible but can create congestion at the
mirror capture port.
Q-in-Q VLAN for performance & security
(prevision, upgrade via FW)
The VLAN feature in the switch offers the benefits of both security and
performance. VLAN is used to isolate traffic between different users
and thus provides better security. Limiting the broadcast traffic to within
the same VLAN broadcast domain also enhances performance. Q-in-Q,
the use of double VLAN tags is an efficient method for enabling
Subscriber Aggregation. This is very useful in the MAN.
Isolated Group, provides protection for certain ports
The isolated group feature allows certain ports to be designated as
protected. All other ports are non-isolated. Traffic between isolated
group members is blocked. Traffic can only be sent from isolated group
to non-isolated group.
Mac-based 802.3ad LACP with automatic link fail-over
Dynamic fail-over means packets will not get assigned to any trunk
member port that has failed. If one of the ports were to fail, traffic will
automatically get distributed to the remaining active ports.
802.1x Access Control improves network security
802.1x features enable user authentication for each network access
attempt. Port security features allow you to limit the number of MAC
addresses per port in order to control the number of stations for each
port. Static MAC addresses can be defined for each port to ensure only
registered machines are allowed to access. By enabling both of these
features, you can establish an access mechanism based on user and
machine identities, as well as control the number of access stations.
802.1d Compatible & 802.1w Rapid Spanning Tree
For mission critical environments with multiple switches supporting
Benefits Benefits
RUB
Networking & Communications
TECHTECH
R
Gigabit Switch
L2 Plus Managed Switch
Gigabit Switch
Spanning Tree, VLAN, Port Trunking,
Bandwidth Control, Port Security, SNMP/
RMON, IGMP Snooping capability via the
intelligent software. It is suitable for both
metro-LAN and office applications.
STP, you can configure the switches with a redundant backup bridge
path, so transmission and reception of packets can be guaranteed in
event of any fail-over switch on the network.
8 dual media ports for flexible fiber connection
8-Port dual media ports are provided for flexible fiber connection. You
can select to install optional transceiver modules in these slots for
short, medium or long distance fiber backbone attachment. Use of the
SFP will disable their corresponding built-in 10/100/1000Base-T
connections.
Broadcast/Multicast/unknown-unicast Storm Control
To limit too many broadcast/multicast/unknown-unicast flooding in the
network, broadcast/multicast storm control is used to restrict excess
traffic. Threshold values are available to control the rate limit for each
port. Packets are discarded if the count exceeds the configured upper
threshold.
IP-MAC-Port Binding
The IP network layer uses a four-byte address. The Ethernet link layer
uses a six-byte MAC address. Binding these two address types
together allows the transmission of data between the layers. The
primary purpose of IP-MAC binding is to restrict the access to a switch
to a number of authorized users. Only the authorized client can access
the Switch's port by checking the pair of IP-MAC Addresses and port
number with the pre-configured database. If an unauthorized user tries
to access an IP-MAC binding enabled port, the system will block the
access by dropping its packet.
Access Control List (ACL)
The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and
VLAN parameters etc. Here we will just go over the standard and
extended access lists for TCP/IP. As you create ACEs for ingress
classification, you can assign a policy for each port, the policy number
is 1-8, however, each policy can be applied to any port. This makes it
very easy to determine what type of ACL policy you will be working with.
Technical SpecificationsTechnical Specifications
Standard compliance
---IEEE 802.3 10Base-T Ethernet(twisted-pair copper)
---IEEE 802.3u 100Base-TX Ethernet(twisted-pair copper)
---IEEE 802.3ab 1000Base-TX Ethernet(twisted-pair copper)
---IEEE 802.3z 1000Base-X Ethernet
---IEEE 802.3x flow control capability
---ANSI/IEEE 802.3 auto-negotiation
---IEEE 802.1q VLAN
RoHS Compliance
Subscriber Interface
---16-Port SFP + 8-Port Combo port (SFP/RJ-45)
---Port 1,2,3,4,5,6,7,8 are Gigabit TP/SFP Fiber auto sense
---Auto-Negotiation and Auto-MDIX
---Backpressure flow control for half duplex.
---802.3x flow control for full duplex.
---Connector: 16 SFP and 8 combo port, RJ-45/SFP
Performance
Switching capacity
---Non-blocking switch fabric supports up to 24GbE ports
---8 K MAC addresses
---The maximum throughput is 48Gbps
VLAN
---Supports SVL/IVL configuration to meet your VLAN requirement
---Port-base VLAN
---IEEE802.1q tag-base VLAN, 4094 max, up to 1024 active VLANs
including static plus dynamic entry
---IEEE802.1q tag-base VLAN