Huawei S5700-28C-PWR-EI Network Switch
Huawei S5700-28C-PWR-EI is a managed 48 port 10/100/1000Base-T Ethernet switch with Support for 4x1000Base-X SFP subcard, 2x10GE SFP+ subcard, and 4x10GE SFP+ subcards. The S5700-28C-PWR-EI is part of the S5700 series of Huawei cutting-edge network switches and has been designed to be deployed in a variety of scenarios where there is a demand for high-bandwidth access and Ethernet multi-service aggregationHuawei S5700-28C-PWR-EI Network Switch Overview
The Huawei S5700-28C-PWR-EI includes advanced hardware and software features that allow it to meet high-bandwidth access demands.The hardware of the S5700-28C-PWR-EI supports IPv4/IPv6 dual stack, IPv6 over IPv4 tunnels, and Layer 3 line-speed forwarding. This allows this Huawei S5700 Switch to installed on IPv4 networks, IPv6 networks or networks that run both. This feature allows for flexibility within a network as well as enabling the migration from IPv4 to IPv6.
The Huawei S5700-28C-PWR-EI uses utilizes both standard software technologies combined with technologies created by Huawei aid across a variety of functions including installation, maintenance, management, QoS, traffic management, and scaling.
To help with network security this network switch includes several different features. The Huawei S5700-28C-PWR-EI implements complex traffic classification based on packet information, such as the 5-tuple, IP preference, ToS, DSCP, IP protocol type, ICMP type, TCP source port, VLAN ID, Ethernet protocol type, and CoS. It also provides multiple security measures to defend against Denial of Service (DoS) attacks, as well as attacks against networks or users. DoS attack types include SYN Flood attacks, Land attacks, Smurf attacks, and ICMP Flood attacks.
The SI in the name of the Huawei S5700-28C-PWR-EI
indicates that it is a standard version. The key feature differences between a standard version of a Huawei switch compared to the other versions are:
- Ipv4 Routing Protocol: Static route/RIP
- IPv6 Routing Protocol: Static route/RIPng
- MPLS: N/A
- OAM/BFD: Software level
- Maintenance: N/A
Port | Forty-eight 10/100/1000Base-T ports |
Forwarding performance | 132 Mpps |
Extended slot | two extended slots, one for an uplink subcard and the other for for a stack card. |
MAC address table | IEEE 802.1d compliance 16 K MAC address entries MAC address learning and aging Static, dynamic, and blackhole MAC address entries Packet filtering based on source MAC addresses |
VLAN | 4 K VLANs Guest VLAN and voice VLAN VLAN assignment based on MAC addresses, protocols, IP subnets, policies, and ports 1:1 and N:1 VLAN Mapping SuperVLAN |
Reliability | RRPP ring topology and RRPP multi-instance Smart Link tree topology and Smart Link multi-instance, providing the millisecond-level protection switchover SEP STP, RSTP, and MSTP BPDU protection, root protection, and loop protection E-Trunk |
IP routing | Static routing, ECMP RIPv1, RIPv2 and RIPng |
IPv6 features | Neighbor Discovery (ND) Path MTU (PMTU) IPv6 ping, IPv6 tracert, and IPv6 Telnet ACLs based on the source IPv6 address, destination IPv6 address, Layer 4 ports, or protocol type MLD v1/v2 snooping 6to4 tunnel, ISATAP tunnel, and manually configured tunnel |
Multicast | IGMP v1/v2/v3 snooping and IGMP fast leave Multicast forwarding in a VLAN and multicast replication between VLANs Multicast load balancing among member ports of a trunk Controllable multicast Port-based multicast traffic statistics |
QoS/ACL | Rate limiting on packets sent and received by an interface Packet redirection Port-based traffic policing and two-rate three-color CAR Eight queues on each port WRR, DRR, SP, WRR+SP, and DRR+SP queue scheduling algorithms Re-marking of the 802.1p priority and DSCP priority Packet filtering at Layers 2 through 4, filtering out invalid frames based on the source MAC address, destination MAC address, source IP address, destination IP address, port number, protocol type, and VLAN ID Rate limiting in each queue and traffic shaping on ports |
OAM | Supports |
Security | User privilege management and password protection DoS attack defense, ARP attack defense, and ICMP attack defense Binding of the IP address, MAC address, interface, and VLAN Port isolation, port security, and sticky MAC Blackhole MAC address entries Limit on the number of learned MAC addresses 802.1x authentication and limit on the number of users on an interface AAA authentication, RADIUS authentication, HWTACACS authentication, and NAC SSH v2.0 Hypertext Transfer Protocol Secure (HTTPS) CPU defense Blacklist and whitelist |
No comments:
Post a Comment