Hello and welcome toTitker Trade Network!
UCONN switches, 10,000 data center switches, 10 Gigabit ring switc

free member

Shenzhen Shisu Technology Youken Gigabit Fiber Switch UKG1610GC

价格 20900.00元/台
total supply
10000 台
MOQ
1 台
brand
优肯
area
GuangdongShenzhen
Delivery period:
Shipped within 3 days from the date of payment by the buyer
Buyers are still looking
  • 1
  • 2
  • 3
Products Recommended

Shop information

area:Guangdong Shenzhen

Member level:corporate memberYear1

identity:  

Already paid:0.00 yuan deposit

my badge: [Integrity File]

online service:

Business card

shenzhen time speed technology co

Applets
【Kind tips】When you call, please mention that you saw us on Titker Trade Network, thank you.
Product Details
< : b.> : b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b> : b> : b > : b> : b> : b> : b>< r# : b>★
Youken fiber optic switch is a two- and four-layer Gigabit managed switch, providing R electrical ports and independent ports . The hardware supports layer 2 full line-speed switching. Users can set various functions of the switch in B form through the Ethernet port. The built-in R and defense system can effectively defend against R, and various variant virus attacks. It is also equipped with many very powerful functions: comprehensive, r, various storm suppression, B r, , access control, etc. It is very suitable for small and medium-sized enterprises. Tandem applications for enterprises, campus networks and metropolitan area networks.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
Unique in the industry, the B chip core has built-in defense functions
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b >< r# : b>
R defense: The address and port binding function and address security filtering function can effectively defend against R attacks and provide R protection for users who dynamically obtain addresses.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
:Supports multiple strategies, based on priority settings. Each port provides a priority queue that can divide service levels according to different headers to achieve comprehensive functions. The port can be set to the highest priority for voice signals, greatly improving the voice quality of Internet calls. quality.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
Supports ., .(Rapid Spanning Tree Protocol) and .(Multiple Spanning Tree Protocol) standards.
: b>< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b> : b>< : b> : b> : b>< : b>< r# : b>★
. .>: The following seven different attacks can be defended:

. .> () Attack: The attacker sends a flow of forged data packets with the same source address and destination address. The victim system attempts to send response information to itself. As a result, the system is interfered with and will be paralyzed or restarted.

. .>() B attack: The attacker sends forged data packets with the same source port number and destination port number, and the victim system tries to send response information to itself. The result is that the system is paralyzed or Restart.

. .>()r attack: The attacker uses the spoofed source address of the attack target to perform an operation to a broadcast address, and then all active hosts will reply to the target, causing network congestion or even Interrupt.

. .> () Flooding: Use broadcast storms to flood the entire target system so that the system cannot respond to legitimate communications.

. .> () Flood: Use or message to flood the entire target system.
. .> () Protection against invalid attacks: Prevent data floods caused by invalid data packets.

. .> () Attack: Send a very large request packet (once), with the intention of causing the target computer's input buffer to overflow and paralyze it.
< br : b. . > : b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Storm suppression: You can set broadcast, multicast, and traffic.

: b . . >< : b> : b> : b>< : b> < r# : b>★ : b> : b>< : b>< r# : b>
. .>Access control: used to control the incoming and outgoing data packets of the port to ensure that some sites on the intranet will not Accessed by unauthorized users, it also indirectly plays a role in preventing R attacks.

: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>: The supported version is used to establish a multicast group to many when multicast packets overflow the network. Broadcast data packets are forwarded to avoid wasting bandwidth.

: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Support .authentication and provide access authentication for users.

: b . . >< : b > : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Support automatic line sequence crossover function and adaptive R Port.

: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Line-speed filtering store-and-forward mode, providing a true non-blocking switching structure.

: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Supports port mirroring, port aggregation, and port speed limiting functions.< br/>
: b . . >< : b> : b> : b>< : b>< r# : b>★ : b> : b>< : b>< r# : b>
. .>Supports port-based and .-based.
Disclaimer

The information/pictures/parameters, etc. displayed on this webpage about【Shenzhen Shisu Technology Youken Gigabit Fiber Switch UKG1610GC】are provided by member【shenzhen time speed technology co 】,By Titker Trade Network members 【shenzhen time speed technology co 】is solely responsible for the authenticity, accuracy and legality of the information/pictures/parameters, etc.,Titker Trade Network only provides display services. For your safety, please choose Titker Trade Network for online trading, otherwise Titker Trade Network will not bear any responsibility for this.

If your legitimate rights and interests have been infringed, please contact Titker Trade Network customer service as soon as possible. We will serve you wholeheartedly. Thank you for your attention and support to Titker Trade Network!

Titker Trade Network