EasyManua.ls Logo

ZyXEL Communications EXTRASMART ES-1528 - Page 2

ZyXEL Communications EXTRASMART ES-1528
4 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Specifications
Standard Compliance
IEEE 802.3 10Base-T Ethernet
IEEE 802.3u 100Base-TX Ethernet
IEEE 802.ab 1000Base-T Ethernet
IEEE 802.3x Flow control
IEEE 802.1p Class of service, priority protocols
IEEE 802.1Q VLAN tagging
IEEE 802.3ad static port aggregation
Performance
ES-1528/ES-1552
12.8/17.6 Gbps non-blocking switching fabric
Switching Forwarding Rate 9.6/13.1 Mpps
(1488000 pps/1000Base-T/1000Base-X, 148800
pps/100Base-TX)
• Wire-speed performance
MAC and Packet Buffer
8 K MAC entries
512 KB Packet Buffer
Traffic Management and QoS
Rate Limiting: Port-based bandwidth control
with 7 grades (64 kbps, 256 kbps, 1 Mbps,
10 Mbps, 64 Mbps, 100 Mbps, 1 Gbps)
Port-based egress traffic shaping
Broadcast Storm Control
Congestion control on all ports
IEEE 802.1p with 4 priority queues per port for
different types of traffic
WRR (Weighted Round Robin)/SPQ scheduling
algorithm
Auto VoIP
Auto VoIP module matches VoIP streams and
assign the highest priority for following VoIP
packets
SIP — Session Initiation Protocol
MGCP — Media Gateway Control Protocol
SCCP — Skinny Client Control Protocol
Link Aggregation
IEEE 802.3ad static port aggregation
Up to 6 aggregation groups, per group supports
up to 8 ports
User Security and Authentication
Specific MAC forwarding per port: only specified
MAC addresses can access the network (Port
Security)
IEEE 802.1Q tagged VLAN
256 static VLAN, up to 4 K dynamic VLAN
• Dynamic ARP
Auto DoS Attack Prevention
Denial of Service (DoS) attacks try to disable a
device or network so users no longer have access
to network resources. Auto DoS Attack Prevention
module matches attack types in switches and
prevent network outage
Types of DoS Attacks can be prevented
Land Attacks — These attacks result from
sending a specially crafted packet to a machine
where the source host IP address is the same as
the destination host IP address. The system
attempts to reply to itself, resulting in system
lockup.
Blat Attack These switch result from sending
a specially crafted packet to a machine where the
source host port is the same as the destination
host port. The system attempts to reply to itself,
resulting in system lockup.
SYNFIN Scans — SYNchronization (SYN,
ACKnowledgement (ACK) and FINish (FIN)
packets are used to initiate, acknowledge and
conclude TCP/IP communication sessions. The
following scans exploit weakness in the TCP/IP
specification and try to illicit a response from a
host to identify ports for an attack:
- Scan SYNFIN — SYN and FIN bits are set in the
packet.
- Xmascan — TCP sequence number is zero and
the FIN, URG and PSH bits are set.
- NULL scan — TCP sequence number is zero and all
control bits are zeros.
- SYN with port <1024 — SYN packets with source
port less than 1024.
Smurf Attacks This attack uses Internet Control
Message Protocol (ICMP) echo requests packets
(pings) to cause network congestion or outrages.
Ping FloodingThis attack floods the target
network with ICMP packets.
SYN/SYN-ACK FloodingThis attack floods the
target network with SYN or SYN/ACK packets.
Network Administration Security
Password required for administrators
Network Management
• Web-based management
SNMP v1, v2
IP management: static IP
• RMON
Port mirroring: supports Source/Destination/Both
port mirroring
• Cable Diagnostic
MIB Information
RFC1213 MIB II (System, Interface)
• RFC1398 (Ether-like)

Related product manuals