Learn more about the Cisco Systems, Inc. WS-C2960G-24TC-L
Model Brand CISCO Series Catalyst 2960 Model WS-C2960G-24TC-L
Spec Standards IEEE 802.1s IEEE 802.1w IEEE 802.1x IEEE 802.3ad IEEE 802.3ah (100BASE-X single/multimode fiber only) IEEE 802.3x full duplex on 10BASE-T, 100BASE-TX, and 1000BASE-T ports IEEE 802.1D Spanning Tree Protocol IEEE 802.1p CoS Prioritization IEEE 802.1Q VLAN IEEE 802.3 10BASE-T specification IEEE 802.3u 100BASE-TX specification IEEE 802.3ab 1000BASE-T specification IEEE 802.3z 1000BASE-X specification Jumbo Frames Yes Ports 20 Ethernet 10/100/1000 ports and 4 dual-purpose uplinks Speed 10/100/1000Mbps MAC Address Table Up to 8000 Buffer Memory 64 MB DRAM 32 MB flash memory Security IEEE 802.1x allows dynamic, port-based security, providing user authentication. IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific user regardless of where the user is connected. IEEE 802.1x with voice VLAN permits an IP phone to access the voice VLAN irrespective of the authorized or unauthorized state of the port. IEEE 802.1x and port security are provided to authenticate the port and manage network access for all MAC addresses, including those of the client. IEEE 802.1x with Guest VLAN allows guests without 802.1x clients to have limited network access on the guest VLAN. Port-based ACLs for Layer 2 interfaces allow application of security policies on individual switch ports. Unicast MAC filtering prevents the forwarding of any type of packet with a matching MAC address. Unknown unicast and multicast port blocking allows tight control by filtering packets that the switch has not already learned how to forward. SSHv2 and SNMPv3 provide network security by encrypting administrator traffic during Telnet and SNMP sessions. SSHv2 and the cryptographic version of SNMPv3 require a special cryptographic software image because of U.S. export restrictions. Bidirectional data support on the Switched Port Analyzer (SPAN) port allows the CISCO Secure intrusion detection system (IDS) to take action when an intruder is detected. TACACS+ and RADIUS authentication enable centralized control of the switch and restrict unauthorized users from altering the configuration. MAC address notification allows administrators to be notified of users added to or removed from the network. DHCP snooping allows administrators to ensure consistent mapping of IP to MAC addresses. This can be used to prevent attacks that attempt to poison the DHCP binding database, and to rate-limit the amount of DHCP traffic that enters a switch port. Cabling 10BASE-T ports: RJ-45 connectors, two-pair Category 3, 4, or 5 unshielded twisted-pair (UTP) cabling 100BASE-TX ports: RJ-45 connectors, two-pair Category 5 UTP cabling 1000BASE-T ports: RJ-45 connectors, four-pair Category 5 UTP cabling 1000BASE-T SFP-based ports: RJ-45 connectors, four-pair Category 5 UTP cabling 1000BASE-SX, -LX/LH, -ZX, -BX and CWDM SFP-based ports: LC fiber connectors (single/multimode fiber) 100BASE-LX, -BX, -FX: LC fiber connectors (single/multimode fiber) LEDs Per-port status: Link integrity, disabled, activity, speed, full-duplex System status: System, RPS, link status, link duplex, link speed VLAN Support Yes Power +12V at 10.5A Dimensions 17.5" x 12.9" x 1.7" Weight 10.0 lbs. Temperature 0 ordm;C to 45 ordm;C (32 ordm;F to 113 ordm;F) Humidity 10 to 85% (noncondensing)
Features Features Availability and Scalability: Superior Redundancy for Fault Backup Integrated CISCO IOS Software Features for Bandwidth Optimization
Advanced QoS: Standard 802.1p CoS and DSCP field classification are provided, using marking and reclassification on a per-packet basis by source and destination IP address, source and destination MAC address, or Layer 4 TCP or UDP port number CISCO control-plane and data-plane QoS ACLs on all ports help ensure proper marking on a per-packet basis Four egress queues per port enable differentiated management of up to four traffic types across the stack SRR scheduling ensures differential prioritization of packet flows by intelligently servicing the ingress and egress queues Weighted tail drop (WTD) provides congestion avoidance at the ingress and egress queues before a disruption occurs Strict priority queuing guarantees that the highest-priority packets are serviced ahead of all other traffic There is no performance penalty for highly granular QoS functions
Granular Rate Limiting: The CISCO CIR function guarantees bandwidth in increments as small as 1 Mbps Rate limiting is provided based on source and destination IP address, source and destination MAC address, Layer 4 TCP and UDP information, or any combination of these fields, using QoS ACLs (IP ACLs or MAC ACLs), class maps, and policy maps Asynchronous data flows upstream and downstream from the end station or on the uplink are easily managed using ingress policing and egress shaping Up to 64 aggregate or individual polices are available per Fast Ethernet or Gigabit Ethernet port
Packaging Package Contents WS-C2960G-24TC-L Manual Power Cord Rack mount kit Cable
Manufacturer Warranty Parts 90 days limited Labor 90 days limited
Disclaimer Disclaimer For most updated manufacturer warranty, please go to www.cisco.com. Registration Phone 1-800-Go-Cisco
|