1. VLAN distribution based on ports. Up to 24 can be configured;
2. IEEE 802.1Q VLAN. Up to 128 can be configured;
3. Protocol VLAN. Up to 16 can be configured;
4. MAC VLAN. Up to 64 can be configured;
5. Voice VLAN;
DHCP Snooping, DHCP Relay, and DHCP Client
1. IGMP Snooping V1/V2;
2. Up to 128 can be configured;
3. Fast leave;
Broadcast Storm
Constrain
1. Broadcast storm constrain based on ports;
2. Multicast storm constrain based on ports;
3. Unknown unicast storm constrain based on ports;
1. IEEE 802.1d STP;
2. IEEE 802.1w FSTP;
3. IEEE 802.1s MSTP protocol. In MSTP mode, up to 16 STP instances
can be configured;
4. Edge port;
5. P2P port;
6. STP BPDU packets statistics;
1. MAC ACL. Up to 100 entries can be configured;
2. IPv4 ACL. Up to 100 entries can be configured;
3. Time range limit;
1. ARP attack defense, worm attack defense, DoS attack defense and
MAC attack defense;
2.User grading management and SSL certification;
3. Management VLAN;
4. IP+MAC+PORT+VLAN Bind. Up to 200 entries can be configured;
5. Interface isolation;
1. Unicast MAC filter;
2. Up to 1000 entries can be configured;
1. 802.1P port trust mode;
2. IP DSCP port trust mode;
3. Bandwidth control;
4. Up to 4-queue QoS mapping;
1. IEEE 802.1X based on ports;
2. IEEE 802.1X based on MAC;
3. Up to 256 MAC can be certificated;
TFTP (Trivial File Transfer Protocol)
1. Telnet configuration;
2. Console interface configuration;
3. SNMP (Simple Network Management Protocol);
4. WEB;