
Cisco CBS250-24FP-4G T-D
CISCO 24 PORT GIGABIT ( 24 POE - 370 W ) & 4 X 1GE SFP SMART SWITCH
E£34500.00
CBS250-24FP-4G SPECIFICATION
Capacity in millions of packets per second (mpps) (64-byte packets)
41.66
Switching capacity in gigabits per second (Gbps)
56.0
Power Dedicated to PoE
370W
Number of ports that support PoE
24
Total system ports
28 Gigabit Ethernet
RJ-45 ports
24 Gigabit Ethernet
Packet buffer
1.5 MB
Unit dimensions (W x D x H)
445 x 345 x 44 mm (17.5 x 13.59 x 1.73 in)
Layer 2 switching
VLAN
Support for up to 255 active VLANs simultaneously
Port-based and 802.1Q tag-based VLANs
Management VLAN
Guest VLAN
Voice VLAN
Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers networkwide zero-touch deployment of voice endpoints and call control devices
Layer 3 routing
IPv4 routing
Wire-speed routing of IPv4 packets
Up to 32 static routes and up to 16 IP interfaces
IPv6 routing
Wire-speed routing of IPv6 packets
Layer 3 interface
Configuration of Layer 3 interface on physical port, LAG, VLAN interface, or loopback interface
Security
Secure Sockets Layer (SSL)
SSL encrypts all HTTPS traffic, allowing secure access to the browser-based management GUI in the switch
Secure Shell (SSH) Protocol
SSH is a secure replacement for Telnet traffic. Secure Copy (SCP) also uses SSH. SSH v1 and v2 are supported.
IEEE 802.1X (authenticator role)
Remote Authentication Dial-In User Service (RADIUS) authentication, guest VLAN, single/multiple host mode, and single/multiple sessions
STP loopback guard
Provides additional protection against Layer 2 forwarding loops (STP loops)
Secure Core Technology (SCT)
Ensures that the switch will receive and process management and protocol traffic no matter how much traffic is received
Secure Sensitive Data (SSD)
A mechanism to manage sensitive data (such as passwords, keys, and so on) securely on the switch, populating this data to other devices, and secure auto-config. Access to view the sensitive data as plain text or encrypted is provided according to the user-configured access level and the access method of the user
Trustworthy systems
Trustworthy systems provide a highly secure foundation for Cisco products
Run-time defenses (Executable Space Protection [X-Space], Address Space Layout Randomization [ASLR], Built-In Object Size Checking [BOSC])
Port security
Ability to lock source MAC addresses to ports and limit the number of learned MAC addresses
RADIUS
Supports RADIUS authentication for management access. Switch functions as a client.
Storm control
Broadcast, multicast, and unknown unicast
DoS prevention
Denial-of-Service (DoS) attack prevention
Multiple user privilege levels in CLI
Level 1, 7, and 15 privilege levels
Access Control Lists (ACLs)
Support for up to 512 rules
Drop or rate limit based on source and destination MAC, VLAN ID or IPv4 or IPv6 address, IPv6 flow label, protocol, port, Differentiated Services Code Point (DSCP)/IP precedence, TCP/UDP source and destination ports, 802.1p priority, Ethernet type, Internet Control Message Protocol (ICMP) packets, IGMP packets, TCP flag; ACL can be applied on both ingress and egress sides
Time-based ACLs supported
Flash
256 MB
CPU
800 MHz ARM
DRAM
512 MB
