Youken fiber optic switch is a two- and four-layer Gigabit managed switch, providing R electrical ports and independent ports . The hardware supports layer 2 full line-speed switching. Users can set various functions of the switch in B form through the Ethernet port. The built-in R and defense system can effectively defend against R, and various variant virus attacks. It is also equipped with many very powerful functions: comprehensive, r, various storm suppression, B r, , access control, etc. It is very suitable for small and medium-sized enterprises. Tandem applications for enterprises, campus networks and metropolitan area networks.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
Unique in the industry, the B chip core has built-in defense functions
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b >< r# : b>
R defense: The address and port binding function and address security filtering function can effectively defend against R attacks and provide R protection for users who dynamically obtain addresses.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
:Supports multiple strategies, based on priority settings. Each port provides a priority queue that can divide service levels according to different headers to achieve comprehensive functions. The port can be set to the highest priority for voice signals, greatly improving the voice quality of Internet calls. quality.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
Supports ., .(Rapid Spanning Tree Protocol) and .(Multiple Spanning Tree Protocol) standards.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b> : b>< : b> : b> : b>< : b>< r# : b>★
. .>: The following seven different attacks can be defended:
. .> () Attack: The attacker sends a flow of forged data packets with the same source address and destination address. The victim system attempts to send response information to itself. As a result, the system is interfered with and will be paralyzed or restarted.
. .>() B attack: The attacker sends forged data packets with the same source port number and destination port number, and the victim system tries to send response information to itself. The result is that the system is paralyzed or Restart.
. .>()r attack: The attacker uses the spoofed source address of the attack target to perform an operation to a broadcast address, and then all active hosts will reply to the target, causing network congestion or even Interrupt.
. .> () Flooding: Use broadcast storms to flood the entire target system so that the system cannot respond to legitimate communications.
. .> () Flood: Use or message to flood the entire target system.
. .> () Attack: Send a very large request packet (once), with the intention of causing the target computer's input buffer to overflow and paralyze it.
< br : b. . > : b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Storm suppression: You can set broadcast, multicast, and traffic.
: b . . >< : b> : b> : b>< : b> < r# : b>★ : b> : b>< : b>< r# : b>
. .>Access control: used to control the incoming and outgoing data packets of the port to ensure that some sites on the intranet will not Accessed by unauthorized users, it also indirectly plays a role in preventing R attacks.
: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>: The supported version is used to establish a multicast group to many when multicast packets overflow the network. Broadcast data packets are forwarded to avoid wasting bandwidth.
: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Support .authentication and provide access authentication for users.
: b . . >< : b > : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Support automatic line sequence crossover function and adaptive R Port.
: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Line-speed filtering store-and-forward mode, providing a true non-blocking switching structure.
: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Supports port mirroring, port aggregation, and port speed limiting functions.< br/>
: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Supports port-based and .-based.