Do you have a question about the Cisco SG350-28 and is the answer not in the manual?
Model | SG350-28 |
---|---|
Category | Switch |
Switching Capacity | 56 Gbps |
Layer | Layer 3 |
Power Supply | Internal |
Form Factor | Rack-mountable |
Relative Humidity | 10% to 90% non-condensing |
MAC Address Table Size | 16K entries |
Power Dedicated to PoE | Not applicable |
Dimensions (W x D x H) | 440 x 257 x 44 mm |
Operating Temperature | 0°C to 45°C |
Storage Temperature | -20°C to 70°C |
Power Consumption | 24W |
Input Voltage | 100-240V AC, 50/60Hz |
Jumbo Frame Support | Supported |
Weight | 3.2 kg |
Navigating the web-based switch configuration utility.
Using wizards or links for initial device setup.
Assists in the initial configuration of the device.
Displays device status, hardware information, and firmware version.
Configures system description, location, contact, host name, and banners.
Manages user accounts and privilege levels for device access.
Manages system files, firmware, and configuration files.
Updates or backs up firmware images and swaps active images.
Configures stack parameters, topology, and master unit.
Sets system time manually, from PC, or via SNTP server.
Configures global and per-port settings like link flap prevention and jumbo frames.
Bundles physical ports to form a single logical channel (LAG) for bandwidth and redundancy.
Manages Power over Ethernet features and configuration.
Describes GUI pages for configuring various types of VLANs.
Configures voice VLAN for IP phones and VoIP endpoints.
Configures parameters for enabling STP, RSTP, or MSTP.
Configures STP on a per-port basis and views learned information.
Assigns static MAC addresses to specific physical interfaces and VLANs.
Configures IGMP snooping, interface settings, VLAN settings, and proxy.
Configures MLD snooping, interface settings, VLAN settings, and proxy.
Manages IPv4 addresses, interfaces, routes, lists, VRRP, ARP, and DHCP.
Manages IPv6 global parameters, interfaces, tunnels, addresses, and routing.
Routes selected packets to a next hop based on packet fields using ACLs.
Establishes TACACS+ server for centralized security, authentication, and authorization.
Provides centralized 802.1X or MAC-based network access control using RADIUS servers.
Defines access rules for various management methods like Telnet, SSH, HTTP.
Assigns authentication and authorization methods for management access.
Facilitates protection of sensitive data like passwords and keys using encryption.
Establishes an SSH session for secure remote access to the device.
Limits access on a port to users with specific MAC addresses.
Restricts unauthorized clients from connecting to the LAN.
Prevents traffic attacks caused by hosts using a neighbor's IP address.
Maps IP addresses to MAC addresses to prevent ARP cache poisoning.
Resists Denial of Service (DoS) attacks by limiting traffic.
Explains mandatory and optional actions for configuring RIP.
Details virtual router identification, VRRP versions, and IP addresses.
Explains how to configure virtual routers, VRRP advertisements, and statistics.
Configures ICMP-Echo operations and SLA tracks for monitoring.
Configures QoS modes (Basic, Advanced, Disabled) and trust settings.
Configures QoS based on CoS/802.1p or DSCP values for egress queues.
Configures per-flow QoS using class maps, policers, and policies.
Enables SSH user authentication by public key and/or password.
Authenticates the SSH server to ensure connection to the expected SSH driver.
Treats trapped RA messages, filtering and validating received RA messages.
Validates received Neighbor Discovery protocol messages and performs egress filtering.
Treats trapped DHCPv6 messages, filtering and validating received messages.
Establishes binding of neighbors by learning IPv6 addresses and storing them.
Validates source IPv6 addresses of NDP and DHCPv6 messages.
Describes attack protection provided by IPv6 First Hop Security features.
Filters traffic based on Layer 2 fields.
Creates ACLs to check IPv4 packets based on various fields.
Creates IPv6 ACLs to check pure IPv6-based traffic.
Displays graphical representation of the network, devices, and connections.
Configures a list of authorized client devices using MAC authentication.