S3700-52P-PWR-EI Specifications
|
Manufacturer |
Huawei |
Manufacturer Part Number |
S3700-52P-PWR-EI |
Form Factor |
Fixed, Stackable |
Switch Port |
48 FE PoE, 2 GE Combo and 2 GE SFP ports |
Power Over Ethernet (PoE) |
PoE Switch |
Performance |
Forwarding performance |
13.2 Mpps |
MAC address table |
IEEE 802.1d compliance |
16 K MAC address entries |
MAC address learning and aging |
Static, dynamic, and blackhole MAC address entries |
Packet filtering based on source MAC addresses |
VLAN |
4K VLANs |
Reliability |
RRPP ring topology and RRPP multi-instance |
Smart Link tree topology and Smart Link multi-instance, providing the millisecond-level protection switchover |
SEP |
STP, RSTP, and MSTP |
BPDU protection, root protection, and loop protection |
IP routing |
Static routing, RIPv1, RIPv2, and ECMP OSPF, IS-IS, and BGP |
IPv6 features |
Neighbor Discovery (ND) |
Path MTU (PMTU) |
IPv6 ping, IPv6 tracert, and IPv6 Telnet |
ACLs based on the source IPv6 address, destination IPv6 address, Layer 4 ports, or protocol type |
MLD v1/v2 snooping |
6to4 tunnel, ISATAP tunnel, and manually configured tunnel |
Multicast |
IGMP v1/v2/v3 snooping and IGMP fast leave |
Multicast forwarding in a VLAN and multicast replication between VLANs |
Multicast load balancing among member ports of a trunk |
Controllable multicast |
Port-based multicast traffic statistics |
QoS/ACL |
Rate limiting on packets sent and received by an interface |
Packet redirection |
Port-based traffic policing and two-rate three-color CAR |
Eight queues on each port |
WRR, DRR, SP, WRR+SP, and DRR+SP queue scheduling algorithms |
Re-marking of the 802.1p priority and DSCP priority |
Packet filtering at Layers 2 through 4, filtering out invalid frames based on the source MAC address, destination |
MAC address, source IP address, destination IP address, port number, protocol type, and VLAN ID |
Rate limiting in each queue and traffic shaping on ports |
Security |
User privilege management and password protection |
DoS attack defense, ARP attack defense, and ICMP attack defense |
Binding of the IP address, MAC address, interface, and VLAN |
Port isolation, port security, and sticky MAC |
Blackhole MAC address entries |
Limit on the number of learned MAC addresses |
802.1x authentication and limit on the number of users on an interface |
AAA authentication, RADIUS authentication, HWTACACS authentication, and NAC |
SSH v2.0 |
Hypertext Transfer Protocol Secure (HTTPS) |
CPU defense |
Blacklist and whitelist |