|Ruby Tech announces new Industrial 8-Port L2 Plus Managed Fast Ethernet Switch + 2 TP/SFP Gigabit Dual Media
IES-2410C is an industrial Managed Fast Ethernet switch that supports SNMP, Web UI and CLI management interface and with 8 10/100Base-TX (RJ-45 connectors) and 2 Gigabit dual media (RJ-45/SFP) ports. It is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. In addition, the switch implements the QoS (Quality of Service), VLAN, Mac Filtering Policy, Port Mirror and full L2 protocols. It has a rich feature set suitable for streaming VoIP, video, and data traffics for multimedia applications.
Moreover, for industrial automation application, redundancy is an important issue to ensure the network reliability, IES-2410C provides R-Ring technology to enable self-recover time in less than 300ms.
In this switch, Port 9, 10 support two types of media --- TP and SFP Fiber (LC, BiDi-LC…); both ports support 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-speed connection expansion.
QoS with four priority queues
The QoS(Quality of Service) feature provides four internal queues to support four different classifications of traffic. High priority packet streams experience less delay inside the switch, which supports lower latency for certain delay-sensitive traffic.
The IES-2410C can classify the packet as one of the four priorities according to vip port, 802.1p priority tag, DiffServ and/or IP TOS. The QoS operate at full wire speed. The actual scheduling at each egress port can be based upon a strict priority, weighted round robin or a mix of both.
This mechanism helps track network errors or abnormal packet transmission without interrupting the flow of data. Allow ingress traffic to be monitored by a single port that is defined as mirror capture port. The mirror capture port can be any 10/100 port, 10/100/1000 port. Mirroring multiple ports is possible but can create congestion at the mirror capture port.
Q-in-Q VLAN for performance & security
The VLAN feature in the switch offers the benefits of both security and performance. VLAN is used to isolate traffic between different users and thus provides better security. Limiting the broadcast traffic to within the same VLAN broadcast domain also enhances performance. Q-in-Q, the use of double VLAN tags is an efficient method for enabling Subscriber Aggregation. This is very useful in the MAN.
Isolated Group, provides protection for certain ports
The isolated group feature allows certain ports to be designed as protected. All other ports are non-isolated. Traffic between isolated group members is blocked. Traffic can only be sent from isolated group to non-isolated group.
Mac-based 802.3ad LACP with automatic link fail-over
Dynamic fail-over means packets will not get assigned to any trunk member port that has failed. If one of the ports were to fail, traffic will automatically get distributed to the remaining active ports.
802.1x Access Control improves network security
802.1x features enable user authentication for each network access attempt. Port security features allow you to limit the number of MAC addresses per port in order to control the number of stations for each port. Static MAC addresses can be defined for each port to ensure only registered machines are allowed to access. By enabling both of these features, you can establish an access mechanism based on user and machine identities, as well as control the number of access stations.
802.1d Compatible & 802.1w Rapid Spanning Tree & 802.1s Multiple Spanning Tree
For mission critical environments with multiple switches supporting STP, you can configure the switches with a redundant backup bridge path, so transmission and reception of packets can be guaranteed in event of any fail-over switch on the network.
MSTP is according to IEEE 802.1Q 2005 Clause 13 – Multiple Spanning Tree Protocol. MSTP allows frames assigned to different VLANs to follow separate paths, each based on an independent Multiple Spanning Tree Instance (MSTI), within Multiple Spanning Tree (MST) Regions composed of LANs and or MST Bridges.
2 dual media ports for flexible fiber connection
Port 9, 10 dual media ports are provided for flexible fiber connection. You can select to install optional transceiver modules in these slots for short, medium or long distance fiber backbone attachment. Use of the SFP/GBIC will disable their corresponding built-in 10/100/1000Base-T connections.
Broadcast/Multicast/Unknown-unicast Storm Control
To limit too many broadcast/multicast/unknown-unicast flooding in the network, broadcast/multicast storm control is used to restrict excess traffic. Threshold values are available to control the rate limit for each port. Packets are discarded if the count exceeds the configured upper threshold.
Binding these two address types together allows the transmission of data between the layers to enhance the switch security. The primary purpose of authorized users. Only the authorized client can access the switch’s port by checking the pair of IP-MAC Addresses and port number with the pre-configured database. If an unauthorized user tries to access an IP-MAC binding enabled port, the system will block the access by dropping its packet.
DHCP Snooping (Including DHCP Option 82)
This DHCP Snooping enables the Dynamic Host Configuration Protocol(DHCP) relay agent information (option 82) was included in the feature.
To include information about itself and the attached client when forwarding DHCP requests from a DHCP client to a DHCP server via Trust Port. The DHCP server can use this information to assign IP addresses、gateway、subnet mask、DNS for each subscriber of a service-provider network. The DHCP Snooping is using Trust Port and Trust DHCP Server IP Address to filter the illegal DHCP server traffic.
Multicast VLAN Registration(MVR) can support carrier to serve content provider using multicast for Video streaming application in the network.
Each content provider Video streaming has a dedicated multicast VLAN.
The MVR routes packets received in a multicast source VLAN to one or more receive VLANs. Clients are in the receive VLANs and the multicast server is in the source VLAN.
By default, layer 2 Ethernet switches treat IP multicast traffic in the same manner as broadcast traffic namely, by forwarding frames received on one interface to all other interfaces. This may create excessive traffic on the network and degrade the performance of hosts attached to the switches. The IGMP snooping can significantly reduce traffic from streaming media and other bandwidth-intensive IP multicast applications.
The IGMP Proxy and IGMP Snooping are the same functional target, but mechanism has something different as below:
- IGMP Proxy can send v1/v2 IGMP query together.
IGMP Proxy supports General Query Mac Response Timeout for checking the “client alive status” and speed up the convergence of multicast group member.
- IGMP Proxy provides Specific (Last member) Query to check (can be multiple times) whether other members interest in the same multicast group exist when the port receives IGMP leave.
- IGMP Proxy checks (can be multiple times) the latest status of the group member by scheduled polling from General/Specific Query. It avoids instant port link-down that makes the members to be removed from multicast group.
- The IGMP Proxy is provide better performance than IGMP Snooping for IGMP join and leave message exchange in the switch.
n Standard Compliance
n IEEE 802.3 10Base-T
n IEEE 802.3u 100Base-TX
n IEEE 802.3x Flow Control Capability
n IEEE 802.3z 1000Base-X Ethernet
n IEEE 802.3ab 1000Base-TX
n ANSI/IEEE 802.3 Auto-negotiation
n IEEE 802.1q VLAN
n IEEE 802.1d Spanning Tree Protocol.
n IEEE 802.1w Rapid Spanning Trees
n IEEE 802.1x Port-based Network Access Control
n IEEE802.1p Class of Service
n IEEE 802.3ad Link Aggregation Control Protocol (LACP)
n RoHS Compliance
n Subscriber Interface
n 8 ports 10/100Mbps and 2 Gigabit Ethernet ports.
n Port 9 ,10 are Gigabit TP/SFP Fiber auto sense
n Auto-Negotiation and Auto-MDIX
n Back pressure flow control for half duplex.
n Connector: 8 RJ-45 and 2 dual media, RJ-45/SFP
n Switching capacity:
n Non-blocking switch fabric supports up to 8FE+2GbE ports
n 8 K MAC addresses
n 384K packet buffer
n The maximum throughput is 5.6Gbps
n Supports SVL/IVL configuration to meet your VLAN requirement
n Port-base VLAN
n IEEE802.1q tag-base VLAN, 4094 max, up to 4k active VLANs including static plus dynamic entry
n Flooding unknown VLAN frame setting, can flood packet with some VLAN tag associated to an invalid/inactive VLAN
n In tag-base VLAN, supports egress/ingress packet filter
n Q-in-Q is an efficient method for enabling Subscriber Aggregation
n VSM (Virtual Stacking Management)
n Up to 16 switches can be managed via Single IP limited to any specific Ruby-Tech models
n Virtual stacking, no extra stacking hardware is required
n Distributed stacking, no physical central wiring closet is needed
n Port Based (VIP Port), 802.1p , TOS and DiffServ.(IPv4/IPv6) based QoS packet classification
n Supports four level priority queues to prioritize in-bound and out-bound traffic
n Supports two scheduling, WRR and Strict
n Supports priority in a Q-in-Q tag
n Rate Limit
n Ingress rate limit:
Port 1~8: 64K up to 100Mbps
Port 9,10:64K up to 1000Mbps
n Egress rate limit:
Port 1~8: 64K up to 100Mbps
Port 9,10:64K up to 1000Mbps
n Broadcast Storm
n Multicast/Broadcast/Unknown-Unicast Storm suppression.
n Port Mirroring
n Support 1: N RX port mirroring
n Supports port sniffer function with 3 modes:
n (TX Monitor Mode, RX Monitor Mode and TX-RX pair Monitor Mode)
n Redundant Ethernet Ring Capability
n Supports R-Ring (Recover time <300ms) for network redundancy
n 2 Fast Ethernet + 1 Gigabit Ethernet groups
n Per-group max 8 members
n Provides DA, SA and DA+SA MAC-based trunking with automatic link fail-over
n 802.1q with GVRP/ GARP
n Multicastingppression.ort.el priority queue
n 802.1d STP/802.1w RSTP/802.1s MSTP
n Network Security
n 802.1x network access control
n Isolated group, to allow certain ports being designated as protected
n Management Access Policy Control
n IP-MAC-Port binding
n DHCP option 82 and DHCP Snooping
n Static MAC, to limit which MAC addresses can pass through or not
n MAC addresses learning limit, to set up the maximum amount of MAC that each port can learn
n Snmpv1,v2c Network Management
■RFC 1213 MIB (MIB-II)
■RFC 1757 RMON MIB
■Statistics Group 1
■Address Translation MIB
■History Group 2
■Alarm Group 3
■Event Group 9
■RFC 1493 Bridge MIB
■RFC 1643 Ethernet MIB
■IEEE 802.1Q VLAN MIB
■IEEE 802.1P QoS MIB
Pricing and Availability
Please contact with our sales representative for information about pricing and availability. Click here to visit the product page.
For more details about IES-2410C, please contact us at email@example.com
About Ruby Tech Corp.
With more than 20 years of experience in R&D of networking products, Ruby Tech is committed t providing the most advanced and cost-effective products to its customers. What can best benefit its customers is what the company aims at and devotes to.