Cisco Catalyst 1200 24-port GE, 4x1G SFP C1200-24T-4G

Description

 Product specifications

Feature

Description

Performance

Switching capacity and forwarding rate

All switches are wire-speed and nonblocking

Model

Capacity in millions of packets per second (mpps) (64-byte packets)

Switching capacity in gigabits per second (Gbps)

C1200-8T-D

11.90

16.0

C1200-8T-E-2G

14.88

20.0

C1200-8P-E-2G

14.88

20.0

C1200-8FP-2G

14.88

20.0

C1200-16T-2G

26.78

36.0

C1200-16P-2G

26.78

36.0

C1200-24T-4G

41.66

56.0

C1200-24P-4G

41.66

56.0

C1200-24FP-4G

41.66

56.0

C1200-48T-4G

77.38

104.0

C1200-48P-4G

77.38

104.0

C1200-24T-4X

95.23

128.0

C1200-24P-4X

95.23

128.0

C1200-24FP-4X

95.23

128.0

C1200-48T-4X

130.94

176.0

C1200-48P-4X

130.94

176.0

Layer 2 switching

Spanning Tree Protocol (STP)

Standard 802.1d spanning tree support

Fast convergence using 802.1w (Rapid Spanning Tree Protocol [RSTP]), enabled by default

Multiple spanning tree instances using 802.1s (MSTP); 8 instances are supported

Per-VLAN Spanning Tree Plus (PVST+); 126 instances are supported

Rapid PVST+ (RPVST+); 126 instances are supported

Port grouping/link aggregation

Support for IEEE 802.3ad Link Aggregation Control Protocol (LACP)

●  Up to 4 groups
●  Up to 8 ports per group with 16 candidate ports for each (dynamic) 802.3ad Link Aggregation Group (LAG)

VLAN

Support for up to 255 active VLANs simultaneously

Port-based and 802.1Q tag-based VLANs

Management VLAN

Guest VLAN

Auto Surveillance VLAN (ASV)

Voice VLAN

Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers networkwide zero-touch deployment of voice endpoints and call control devices

Generic VLAN Registration Protocol (GVRP) and Generic Attribute Registration Protocol (GARP)

Enable automatically propagation and configuration of VLANs in a bridged domain

Internet Group Management Protocol (IGMP) versions 1, 2, and 3 snooping

Limits bandwidth-intensive multicast traffic to only the requesters; supports 255 multicast groups (source-specific multicasting is also supported)

IGMP querier

Used to support a Layer 2 multicast domain of snooping switches in the absence of a multicast router

Head-of-Line (HOL) blocking

HOL blocking prevention

Loopback detection

Provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of STP

Layer 3 routing

IPv4 routing

Wire-speed routing of IPv4 packets

Up to 32 static routes and up to 16 IP interfaces

IPv6 routing

Wire-speed routing of IPv6 packets

Layer 3 interface

Configuration of Layer 3 interface on physical port, LAG, VLAN interface, or loopback interface

Classless Interdomain Routing (CIDR)

Support for CIDR

Dynamic Host Configuration Protocol (DHCP) relay at Layer 3

Relay of DHCP traffic across IP domains

User Datagram Protocol (UDP) relay

Relay of broadcast information across Layer 3 domains for application discovery or relaying of Bootstrap Protocol (BootP)/DHCP packets

Security

Secure Sockets Layer (SSL)

Encrypts all HTTPS traffic, allowing secure access to the browser-based management GUI in the switch

SSH Protocol

SSH is a secure replacement for Telnet traffic. Secure Copy (SCP) also uses SSH. SSH v1 and v2 are supported.

IEEE 802.1X (authenticator role)

RADIUS authentication, guest VLAN, single/multiple host mode, and single/multiple sessions

STP loopback guard

Provides additional protection against Layer 2 forwarding loops (STP loops)

Secure Core Technology (SCT)

Ensures that the switch will receive and process management and protocol traffic no matter how much traffic is received

Secure Sensitive Data (SSD)

A mechanism to manage sensitive data (such as passwords, keys, and so on) securely on the switch, populating this data to other devices and a secure auto-configuration. Access to view the sensitive data as plain text or encrypted is provided according to the user-configured access level and the access method of the user

Trustworthy systems

Trustworthy systems provide a highly secure foundation for Cisco products

Run-time defenses (Executable Space Protection [X-Space], Address Space Layout Randomization [ASLR], Built-In Object Size Checking [BOSC])

Port security

Ability to lock source MAC addresses to ports and limit the number of learned MAC addresses

RADIUS

Supports RADIUS authentication for management access. Switch functions as a client

Storm control

Broadcast, multicast, and unknown unicast

DoS prevention

DoS attack prevention

Multiple user privilege levels in CLI

Level 1, 7, and 15 privilege levels

ACLs

Support for up to 512 rules

Drop or rate limit based on source and destination MAC, VLAN ID, IPv4 or IPv6 address, IPv6 flow label, protocol, port, Differentiated Services Code Point (DSCP)/IP precedence, TCP/UDP source and destination ports, 802.1p priority, Ethernet type, Internet Control Message Protocol (ICMP) packets, IGMP packets, TCP flag; ACL can be applied on both ingress and egress sides

Time-based ACLs supported

Reviews

There are no reviews yet.

Be the first to review “Cisco Catalyst 1200 24-port GE, 4x1G SFP C1200-24T-4G”

อีเมลของคุณจะไม่แสดงให้คนอื่นเห็น ช่องข้อมูลจำเป็นถูกทำเครื่องหมาย *