Your Location: Home > News > Ruby Tech announces new 8-Port GbE L2 Plus Managed Switch with 2 SFP Dual Media

Ruby Tech announces new 8-Port GbE L2 Plus Managed Switch with 2 SFP Dual Media

GS-2208C, an 8-port Gigabit L2 Managed Switch, is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch includes 8-Port 10/100/1000Mbps TP and 2-Port Gigabit TP/SFP Fiber management Ethernet switch. The switch can be managed through RS-232 serial port, or through Ethernet port using CLI or Web-based management unit, associated with SNMP agent. With the SNMP agent, the network administrator can logon the switch to monitor, configure and control each port?謒?activity in a friendly way. The overall network management is enhanced and the network efficiency is also improved to accommodate high bandwidth applications. In addition, the switch features comprehensive and useful functions such as QoS (Quality of Service), Spanning Tree, VLAN, Port Trunking, Bandwidth Control, Port Security, SNMP/RMON, IGMP Snooping capability via the intelligent software. It is suitable for both metro-LAN and office applications.

Others the switch  increase support the Power saving for reduce the power consumption with Power Management technique. It could efficient saving the switch power with auto detect the client idle and cable length to provide different power.




QoS with four priority queues

The QoS(Quality Of Service) Control List (QCL) feature provides four internal queues to support four different classifications of traffic. High priority packet streams experience less delay inside the switch, which supports lower latency for certain delay-sensitive traffic. The GS-2208C can classify the packet as one of the four priorities according to vip port, 802.1p priority tag, DiffServ and/or IP TOS, IPv4 and UDP/TCP application traffics. The QoS operate at full wire speed. The actual scheduling at each egress port can be based upon a strict priority, weighted round robin or a mix of both.

2 dual media for flexible fiber connection

7 and 8 dual media port are provided for flexible fiber connection. You can select to install optional transceiver modules in these slots for short, medium or long distance fiber backbone attachment. Use of the SFP will disable their corresponding built-in 10/100/1000Base-T connections.

QoS supports Layer 4 Classification

The switch supports not only Layer 2 802.1p Priority Queue control, but also supports programmable higher layer classification and prioritization to enable enhanced Quality of Service (Qos) support for real time applications base on information taken from Layer 2 to Layer 4, such as VoIP.

Port Mirroring Helps Supervisor Monitoring Network

Port mirroring copies traffic from a specific port to a target port. This mechanism helps track network errors or abnormal packet transmission without interrupting the flow of data. 

Q-in-Q VLAN for Performance & Security

The VLAN feature in the switch offers the benefits of both security and performance. VLAN is used to isolate traffic between different users and thus provides better security. Limiting the broadcast traffic to within the same VLAN broadcast domain also enhances performance. Q-in-Q, the use of double VLAN tags is an efficient method for enabling Subscriber Aggregation. This is very useful in the MAN.

802.3ad Port Trunk for Bandwidth Aggregation

The Gigabit ports can be combined together to create a multi-link load-sharing trunk. Up to 4 Gigabit ports can be set up per trunk for bandwidth up to 8Gbps, all traffic is aggregated based on MAC addresses, thus balancing the traffic load. The switch supports up to 4 trunking groups. Port trunks are useful for switch-to-switch cascading, providing very high full-duplex speeds.

802.1x Access Control Improve Network Security

802.1x features enable user authentication for each network access attempt. Port security features allow you to limit the number of MAC addresses per port in order to control the number of stations for each port. Static MAC addresses can be defined for each port to ensure only registered machines are allowed to access. By enabling both of these features, you can establish an access mechanism based on user and machine identities, as well as control the number of access stations.

802.1d STP, 802.1 w/s RSPT/ MSTP

For mission critical environments with multiple switches supporting STP, you can configure the switches with a redundant backup bridge path, so transmission and reception of packets can be guaranteed in event of any fail-over switch on the network.

Unknown-Unicast /Broadcast/Multicast Storm Control

To limit too many broadcast/multicast/unknown-unicast flooding in the network, broadcast/multicast storm control is used to restrict excess traffic. Threshold values are available to control the rate limit for each port. Packets are discarded if the count exceeds the configured upper threshold.

IP-MAC-Port Binding

The IP network layer uses a four-byte address. The Ethernet link layer uses a six-byte MAC address. Binding these two address types together allows the transmission of data between the layers. The primary purpose of IP-MAC binding is to restrict the access to a switch to a number of authorized users. Only the authorized client can access the Switch?謒?port by checking the pair of IP-MAC Addresses and port number with the pre-configured database. If an unauthorized user tries to access an IP-MAC binding enabled port, the system will block the access by dropping its packet.

Access Control List (ACL)

The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and VLAN parameters etc. Here we will just go over the standard and extended access lists for TCP/IP. As you create ACEs for ingress classification, you can assign a policy for each port, the policy number is 1-8, however, each policy can be applied to any port. This makes it very easy to determine what type of ACL policy you will be working with.

DHCP Snooping (Including DHCP Option 82)

This DHCP Snooping enables the Dynamic Host Configuration Protocol (DHCP) relay agent information (option 82) was included in the feature. To include information about itself and the attached client when forwarding DHCP requests from a DHCP client to a DHCP server via Trust Port. The DHCP server can use this information to assign IP addresses??/SPAN>gateway??/SPAN>subnet mask??/SPAN>DNS for each subscriber of a service-provider network. The DHCP Snooping is using Trust Port and Trust DHCP Server IP Address to filter the illegal DHCP server traffic.

IGMPv3 Snooping

By default, layer 2 Ethernet switches treat IP multicast traffic in the same manner as broadcast traffic ??namely, by forwarding frames received on one interface to all other interfaces. This may create excessive traffic on the network and degrade the performance of hosts attached to the switches. The IGMPv3 snooping can significantly reduce traffic from streaming media and other bandwidth-intensive IP multicast applications.

IGMP Proxy

The IGMP proxy and IGMPv3 Snooping is the same functional target, but mechanism has some thing different as below:

1.       IGMP Proxy can send v1/v2 IGMP query together.

2.       IGMP Proxy supports General Query Mac Response Timeout for checking the "client alive status" and speed up the convergence of multicast group member.

3.       IGMP Proxy provides Specific (Last member) Query to check (can be multiple times) whether other members interest in the same multicast group exist when the port receives IGMP leave.

4.       IGMP Proxy checks (can be multiple times) the latest status of the group member by scheduled polling from General/Specific Query. It avoids instant port link-down that makes the members to be removed from multicast group.

The IGMP Proxy is providing better performance than IGMPv3 Snooping for IGMP join and leave message exchange in the switch.

802.1d Compatible & 802.1w Rapid Spanning Tree & 802.1s Multiple Spanning Tree

For mission critical environments with multiple switches supporting STP, you can configure the switches with a redundant backup bridge path, so transmission and reception of packets can be guaranteed in event of any fail-over switch on the network.

MSTP is according to IEEE 802.1Q 2005 Clause 13 ??Multiple Spanning Tree Protocol. MSTP allows frames assigned to different VLANs to follow separate paths, each based on an independent Multiple Spanning Tree Instance (MSTI), within Multiple Spanning Tree (MST) Regions composed of LANs and or MST Bridges.

SSL and SSH for secure Management (prevision, upgrade via FW)

Secure Sockets Layer (SSL) supports the encryption for all HTTP traffic, allowing secure access to the browser-based management GUI in the switch. And Secure Shell (SSH) which supports the encryption for all transmitted data for secure, remote command-line interface (CLI) access over IP networks

TACACS+ for Management Authentication (prevision, upgrade via FW)

The switch supports the TACACS+ authentication for secure switch CLI Logon. It provides more secure authentication for management.

Power Saving

The Power saving using Power Management techniques to detect the client idle and cable length automatically and provides the different power. It could efficient to save the switch power and reduce the power consumption.



n       2 dual Media for flexible fiber connection

n       9KB jumbo frame support, up to 9K

n       IEEE 802.1x Access control improve network security

n       Port Mirroring helps supervisor monitoring network

n       Q-in-Q VLAN for performance & security and 4k Vlan entries supported

n       IEEE 802.1d Compatible, 802.1w Rapid Spanning Tree and 802.1s Multiple Spanning Tree

n       Unknown Unicast/Broadcast/Multicast Storm Control

n       IP-MAC-Port binding for LAN security

n       QCL based on application traffic for QoS and rate limitation management

n       ACL based on Ethernet Type / ARP / IPv4 for packets permit or deny, rate limitation and port copy

n       DHCP Snooping & DHCP option 82

n       IGMPv3 Snooping & IGMP Proxy

n       SSH/SSL/TACACS+/RADIUS for security network management

n       Auto detect client idle or cable length for Power saving


Technical Specification

n       Standard compliance            

n        IEEE 802.3 10Base-T Ethernet

n        IEEE 802.3u 100Base-TX Fast Ethernet

n        IEEE 802.3ab 1000Base-T Ethernet

n        IEEE 802.3z 1000Base-X Ethernet

n        IEEE 802.3x Flow Control capability

n        ANSI/IEEE 802.3 Auto-negotiation

n        IEEE 802.1q VLAN

n        IEEE 802.1p

n        IEEE 802.1x Access Control

n        IEEE 802.1d Spanning Tree

n        IEEE 802.1w Rapid Spanning Tree

n        IEEE 802.1s Multiple Spanning Tree

n        IEEE 802.3ad Link Aggregation Control Protocol (LACP)

n       RoHS Compliance

n       Power Saving

n        Auto detect client idle or cable length

n       Performance

n        Switching capacity:

n          8 Gigabit Ethernet ports with non-blocking wise speed performance.

n          Switch Capacity: 16Gbps

n          8 K MAC addresses

n          816Kbytes on-chip frame buffer.

n          Supports Jumbo frame support, up to 9K

n          Unknown Unicast/Broadcast/Multicast Storm Suppression

n          Port Mirroring

n        VLAN

n          Port-base VLAN

n          IEEE802.1q tag-base VLAN, up to 4k VLANs

n          Q-in-Q is an efficient method for enabling Subscriber Aggregation.

n        VSM (Virtual Stacking Management):

n          Up to 16 switches can be managed via Single IP limited to any specific Ruby-Tech models.

n          Virtual stacking, no extra stacking hardware is required

n          Distributed stacking, no physical central wiring closet is needed

n        Qos

n          Supports Layer 4 TCP/UDP Port and ToS Classification

n          Supports 802.1p QoS with four level priority queue

n          Supports priority in a Q-in-Q tag

n        Bandwidth Control

n          Supports bandwidth rating per port ingress and egress rate limit 1000Mbps with 1Mbps

n       Protocol

n        LACP

n          Port trunking with 4 trunking group

n          up to 4 ports for each group.

n        GVRP/GARP

n          802.1q with GVRP/ GARP

n        Multicastingppression.ort.el priority queue

n          Supports IGMPv3 snooping including active and passive mode

n          Supports IGMP proxy including active and passive mode

n        STP/RSTP/MSTP

n          802.1d/1w/1s

n       Network Security

n        802.1x access control

n        Management Access Policy Control (ACL)

n        Isolated group

n        Access control List

n        IP-MAC-Port binding

n        DHCP Snooping (Including DHCP Option 82)

n        SSL/ SSH for Management (prevision, upgrade via FW)

n        TACACS+ for Management Authentication (prevision, upgrade via FW)

n       Snmpv1,v2c Network Management



   nSPAN Interface MIB

   nSPAN Statistics Group 1

   nSPAN Address Translation MIB

   nSPAN History Group 2


   nSPAN Alarm Group 3


   nSPAN Event Group 9


nSPAN RFC 1493 Bridge MIB


nSPAN RFC 1643 Ethernet MIB


nSPAN Enterprise MIB


Pricing and Availability


Please contact with our sales representative for information about pricing and availability. Click here to visit the product page.


More Link


For more details about GS-2208C, please contact us at


About Ruby Tech Corp.


With more than 20 years of experience in R&D of networking products, Ruby Tech is committed to providing the most advanced and cost-effective products to its customers. What can best benefit its customers is what the company aims at and devotes to.


 Home | Ruby | News | Products | Solution | Support | Partner | Contact