1. VLAN distribution based on ports. Up to 24 can be configured; 
2. IEEE 802.1Q VLAN. Up to 128 can be configured; 
3. Protocol VLAN. Up to 16 can be configured; 
4. MAC VLAN. Up to 64 can be configured; 
5. Voice VLAN; 
DHCP Snooping, DHCP Relay, and DHCP Client 
1. IGMP Snooping V1/V2; 
2. Up to 128 can be configured; 
3. Fast leave; 
Broadcast  Storm 
Constrain 
1. Broadcast storm constrain based on ports; 
2. Multicast storm constrain based on ports; 
3. Unknown unicast storm constrain based on ports; 
1. IEEE 802.1d STP; 
2. IEEE 802.1w FSTP; 
3. IEEE 802.1s MSTP protocol. In MSTP mode, up to 16 STP instances 
can be configured; 
4. Edge port; 
5. P2P port; 
6. STP BPDU packets statistics; 
1. MAC ACL. Up to 100 entries can be configured; 
2. IPv4 ACL. Up to 100 entries can be configured;   
3. Time range limit; 
1. ARP attack defense, worm attack defense, DoS attack defense and 
MAC attack defense;   
2.User grading management and SSL certification; 
3. Management VLAN; 
4. IP+MAC+PORT+VLAN Bind. Up to 200 entries can be configured; 
5. Interface isolation; 
1. Unicast MAC filter; 
2. Up to 1000 entries can be configured; 
1. 802.1P port trust mode; 
2. IP DSCP port trust mode; 
3. Bandwidth control; 
4. Up to 4-queue QoS mapping; 
1. IEEE 802.1X based on ports; 
2. IEEE 802.1X based on MAC; 
3. Up to 256 MAC can be certificated; 
TFTP (Trivial File Transfer Protocol) 
1. Telnet configuration; 
2. Console interface configuration; 
3. SNMP (Simple Network Management Protocol); 
4. WEB;