Fixed port 24x10GE SFP+, 2x40GE QSFP+ ports
Extended slot Provide one extended slot.
Forwarding performance 720 Mpps
Switching capacity 2.56 Tbps
VLAN 4K VLANs
Guest VLAN and voice VLAN
VLAN assignment based on MAC addresses, protocols, IP subnets, policies, and ports
1:1 and N:1 VLAN Mapping
QinQ and selective QinQ
Reliability STP(IEEE 802.1d), RSTP(IEEE 802.1w), and MSTP(IEEE 802.1s)
BPDU protection, root protection, and loop protection
RRPP ring topology and RRPP multi-instance
Smart Link tree topology and Smart Link multi-instance, providing the millisecond-level protection switchover
SEP, E-Trunk
ERPS(G.8032 v2)
BFD for OSPF, BFD for IS-IS, BFD for VRRP, and BFD for PIM
IPv4 routing Static routing, RIPv1, RIPv2, ECMP, and URPF
OSPF, IS-IS, and BGP
VRRP
Policy-based routing
Routing policy
IPv6 routing Static route
RIPng
OSPFv3
BGP4+
ISISv6
IPv6 features Neighbor Discovery (ND)
Path MTU (PMTU)
IPv6 ping, IPv6 tracert, and IPv6 Telnet
ACLs based on the source IPv6 address, destination IPv6 address, Layer 4 ports, or protocol type
MLD v1/v2 snooping
6to4 tunnel, ISATAP tunnel, and manually configured tunnel
Multicast Static Layer 2 multicast MAC address
MAC-based multicast forwarding
IGMP snooping and IGMP fast leave
Multicast VLAN
MLD snooping
IGMP proxy
Controllable multicast
Port-based multicast traffic statistics
IGMP v1/v2/v3
PIM-SM, PIM-DM, and PIM-SSM
MSDP
QoS/ACL Rate limiting on packets sent and received by an interface
Packet redirection
Port-based traffic policing and two-rate three-color CAR
Eight queues on each port
WRR, DRR, SP, WRR+SP, and DRR+SP queue scheduling algorithms
Re-marking of the 802.1p priority and DSCP priority
Packet filtering at Layers 2 through 4, filtering out invalid frames based on the source MAC address, destination MAC address, source IP address, destination IP address, port number, protocol type, and VLAN ID
Rate limiting in each queue and traffic shaping on ports
Security User privilege management and password protection
DoS attack defense, ARP attack defense, and ICMP attack defense
Binding of the IP address, MAC address, interface, and VLAN
Port isolation, port security, and sticky MAC
Blackhole MAC address entries
Limit on the number of learned MAC addresses
802.1x authentication and limit on the number of users on an interface
AAA authentication, RADIUS authentication, HWTACACS authentication, and NAC
SSH v2.0
Hypertext Transfer Protocol Secure (HTTPS)
CPU defense
Blacklist and whitelist
Super Virtual Fabric (SVF) Working as the parent node to vertically virtualize downlink switches as one device for management,
supports two-layer clients architecture
Support as a client node to be managed by SVF parent
Management and maintenance MAC Forced Forwarding (MFF), iStack (using service ports as stack ports)
Virtual cable test,
SNMP v1/v2c/v3,
RMON, Remote configuration and maintenance using Telnet
Web-based NMS
System logs and alarms of different levels
GVRP
MUX VLAN
Local port mirroring and remote switched port analyzer (RSPAN), allowing an observing port to forward packets
Ethernet OAM (IEEE 802.3ah and 802.1ag)
Interoperability Supports VBST (Compatible with PVST/PVST+/RPVST)
Supports LNP (Similar to DTP)
Supports VCMP (Similar to VTP)