Bridging the gap between networks and applications, DPtech ADX addresses the increasing number of users and their growingly higher requirements for application.
Self-Secure Network
DPtech, built on core technologies of independent intellectual property rights, has launched more than 100 products in a dozen categories. Its products include Deep Service Switching Gateway (DPX), Application Firewall (FW), Intrusion Prevention System (IPS), Anti-DDoS System (Guard/Probe), Web Application Firewall (WAF), Unified Audit Gateway (UAG), Application Delivery Platform (ADX), switches and routers.
In addition, DPtech has further introduced a number of scenario-based solutions for typical application scenarios, including secure network Solution, Self-Secure Branch Offices Solution, Secure IoT Solution, Secure Cloud Data Center Solution featuring “strong power enabled by Cloud security”, and the Internet Egress Solution featuring “Integration, Intelligentization, Easy Management, and Reliable Connection”.
Explore All DPtech Products
Next-generation application smart network featuring service integration, application awareness and outstanding performance.
Choosing a selection results in a full page refresh.
Opens in a new window.
Net Orders Checkout
Item
Price
Qty
Total
Subtotal
RM0.00
Shipping
Total
Shipping Address
Shipping Methods
[{"id":436572061986,"handle":"access-control-integration","title":"Access Control \u0026 Integration","updated_at":"2023-09-23T02:51:50+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003evnetwork combines product, service, and expertise to ensure total integration in every single facet of a building’s openings — from the mechanical and electronic components of the actual door structure to the software and hardware that manages and uses the flow of data.\u003c\/span\u003e","published_at":"2023-02-17T20:35:45+08:00","sort_order":"best-selling","template_suffix":"access-control","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Access Control \u0026 Integration"}],"published_scope":"web","image":{"created_at":"2023-07-31T00:02:11+08:00","alt":null,"width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/X-as-a-Services_1366_x_500_px.png?v=1695408710"}},{"id":443347861794,"handle":"access-points","title":"Access Points","updated_at":"2023-09-06T06:14:30+08:00","body_html":"\u003cp\u003eCheckout our range next-generation cloud-managed Wi-Fi access points.\u003c\/p\u003e","published_at":"2023-05-01T13:08:55+08:00","sort_order":"manual","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Access Points"},{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"}],"published_scope":"web"},{"id":440084267298,"handle":"airmedia®","title":"AirMedia® Wireless Presentation","updated_at":"2023-09-23T02:51:52+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eWith AirMedia® wireless conferencing technology you can transform any space into a high quality conferencing space. Whether you’re in a huddle room, lounge, or mixed use room, it’s easy to present, share, and host a meeting from any device.\u003c\/span\u003e","published_at":"2023-03-28T22:13:17+08:00","sort_order":"best-selling","template_suffix":"airmedia-wireless-presentation","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"AirMedia® Wireless Presentation"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:26:41+08:00","alt":"AirMedia® Wireless Presentation","width":1920,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/AirMedia-Wireless-Presentation-7859.png?v=1695408712"}},{"id":436721189154,"handle":"all-products","title":"All Products","updated_at":"2023-09-27T04:12:39+08:00","body_html":"","published_at":"2023-02-19T23:44:15+08:00","sort_order":"manual","template_suffix":"","disjunctive":false,"rules":[{"column":"variant_price","relation":"greater_than","condition":"0"}],"published_scope":"web"},{"id":439805772066,"handle":"applications","title":"Applications","updated_at":"2023-09-23T02:51:54+08:00","body_html":"\u003cp class=\"u-h1\"\u003eAdvance your business and IT goals with ExtremeApplications\u003c\/p\u003e","published_at":"2023-03-25T13:04:05+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Applications"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:39+08:00","alt":"Applications","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Applications-1747.jpg?v=1695408714"}},{"id":436612563234,"handle":"arcules","title":"Arcules","updated_at":"2023-09-23T02:51:55+08:00","body_html":"","published_at":"2023-02-18T08:46:11+08:00","sort_order":"best-selling","template_suffix":"arcules","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Arcules"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:36+08:00","alt":"Arcules","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Arcules-7236.png?v=1695408715"}},{"id":436572127522,"handle":"audio-visual-conferencing","title":"Audio Visual \u0026 Conferencing","updated_at":"2023-09-23T02:51:56+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eFrom voice-control to facilitate “no-touch” rooms, to multi-platform video conferencing, our expertise can be leveraged to simply pick a new phone system with modern capabilities or design a fully integrated boardroom.\u003c\/span\u003e","published_at":"2023-02-17T20:36:20+08:00","sort_order":"best-selling","template_suffix":"audio-visual-conferencing","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Enterprise Room Solutions"},{"column":"type","relation":"equals","condition":"Digital Workplace"},{"column":"type","relation":"equals","condition":"AirMedia® Wireless Presentation"},{"column":"type","relation":"equals","condition":"DM NVX® AV-over-IP"},{"column":"type","relation":"equals","condition":"Room Scheduling"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:33+08:00","alt":"Audio Visual \u0026 Conferencing","width":663,"height":663,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Audio-Visual-Conferencing-3760.webp?v=1695408716"}},{"id":444388639010,"handle":"aura","title":"Aura","updated_at":"2023-09-18T02:30:47+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eAvaya Aura Platform delivers dependable, secure, and scalable unified communications and customer service solutions throughout your business. Now, extend your capabilities by adding Avaya innovations to enhance your employee and customer experiences. All with no disruption to day-to-day operations.\u003c\/span\u003e","published_at":"2023-05-12T18:10:25+08:00","sort_order":"best-selling","template_suffix":"aura","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Aura"}],"published_scope":"web"},{"id":437797060898,"handle":"automated-infrastructure-management","title":"Automated Infrastructure Management","updated_at":"2023-07-28T20:38:38+08:00","body_html":"","published_at":"2023-03-03T22:27:14+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Automated Infrastructure Management"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:37+08:00","alt":"Automated Infrastructure Management","width":350,"height":225,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Automated-Infrastructure-Management-3942.jpg?v=1690547918"}},{"id":436551254306,"handle":"avaya","title":"Avaya","updated_at":"2023-09-23T02:51:59+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eGo with Avaya to get the most out of your communications—on prem, in the cloud, or hybrid. Make every experience with your business seamless and connected. So, employee collaboration is easier and more efficient, and customer satisfaction is higher. Avaya solutions make it happen.\u003c\/span\u003e","published_at":"2023-02-17T18:06:21+08:00","sort_order":"manual","template_suffix":"avaya","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Avaya"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:13+08:00","alt":"Avaya","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-7866.png?v=1695408719"}},{"id":443049640226,"handle":"call-center-lite","title":"Avaya Call Center Lite","updated_at":"2023-08-31T03:58:06+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eWith Avaya Call Center Elite, you run a full-featured call center that handles inbound and outbound contacts, all manageable with real-time and historical reporting insights. And now you can enhance employee and customer experiences, driving higher satisfaction and loyalty, by adding Avaya innovations to your contact center. All without disrupting your current operations.\u003c\/span\u003e","published_at":"2023-04-27T22:23:35+08:00","sort_order":"best-selling","template_suffix":"call-center-lite","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Contact Center"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:22+08:00","alt":"Avaya Call Center Lite","width":770,"height":513,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-Call-Center-Lite-6533.jpg?v=1690548502"}},{"id":436553154850,"handle":"avaya-cloud-office","title":"Avaya Cloud Office","updated_at":"2023-07-28T20:48:16+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"av-eyebrow-text\"\u003e\n\u003cp data-mce-fragment=\"1\" class=\"text-tiny-body\"\u003e\u003cstrong\u003eA cloud phone system that works where and how you do\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"bullets\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003eSet employees up for non-stop productivity with our all-in-one app that works everywhere and every way your business does. Call, meet, message and more—everything is always handy on any device, in any location. \u003c\/p\u003e\n\u003cbr\u003e\u003cstrong\u003eConnect with calling and chat \u003c\/strong\u003e\n\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"bullets\"\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"bullets\"\u003e\n\u003cbr\u003eA cohesive and collaborative workplace starts with giving everyone more ways to be heard.\u003c\/div\u003e","published_at":"2023-02-17T18:38:27+08:00","sort_order":"best-selling","template_suffix":"avaya-cloud-office","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Avaya Cloud Office"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:16+08:00","alt":"Avaya Cloud Office","width":590,"height":590,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-Cloud-Office-1138.png?v=1690548496"}},{"id":436642742562,"handle":"avaya-spaces","title":"Avaya Spaces","updated_at":"2023-07-28T20:48:21+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eMeetings end, but teamwork must continue. Avaya Spaces connects you with all your people and tools—all in one place, as long as you need. Meet, call, chat, share files, manage tasks. All wrapped in real-time notifications.\u003c\/span\u003e","published_at":"2023-02-18T20:44:38+08:00","sort_order":"best-selling","template_suffix":"avaya-spaces","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Avaya Spaces"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:20+08:00","alt":"Avaya Spaces","width":590,"height":590,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-Spaces-7705.png?v=1690548501"}},{"id":436570390818,"handle":"avaya-ucaas","title":"Avaya UCaaS","updated_at":"2023-07-28T20:48:19+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eUnderstanding communications from the cloud, UCaaS, is simpler than it seems — in fact, you’re likely already using it today. When you chat with an agent, video call your colleagues, or FaceTime your friends — all of that is cloud communication. Even opening an app to create a simple video message is UCaaS or \u003c\/span\u003e\u003ca href=\"https:\/\/www.avaya.com\/en\/products\/ucaas\/\" target=\"_blank\"\u003eUnified Communications as a Service.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eBusinesses use UCaaS to expand their communications options — moving beyond simple voice into chat\/messaging as well as video meetings. Additionally, it can simplify your communications. For example, an employee can have one number for voice, texting, and fax, and that number carries across all their devices, whether they are on a desk phone, mobile, or laptop. But it’s not just about employees — you can also use UCaaS to benefit your customers. For customers, UCaaS can mean improved agent reachability, additional support for remote agents and workers, and having an all-in-one solution creating a holistic customer experience that makes them feel valued.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-17T20:03:03+08:00","sort_order":"best-selling","template_suffix":"avaya-ucaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Avaya UCaaS"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:18+08:00","alt":"Avaya UCaaS","width":590,"height":590,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-UCaaS-4344.png?v=1690548499"}},{"id":439662674210,"handle":"cable-management","title":"Cable Management","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eCable management involves organizing your cabling and connectivity hardware in a way that makes it easy to identify components and troubleshoot problems. This makes future upgrades and repairs easier while keeping your IT spaces professional. \u003c\/span\u003e","published_at":"2023-03-23T21:22:50+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Cable Management"}],"published_scope":"web"},{"id":436612071714,"handle":"cambium-network-xirrus","title":"Cambium Network Xirrus","updated_at":"2023-09-24T00:19:56+08:00","body_html":"\u003ch2 id=\"h-the-xirrus-portfolio-is-now-a-part-of-cambium-networks\" data-mce-fragment=\"1\"\u003eThe Xirrus portfolio is now a part of Cambium Networks\u003c\/h2\u003e\n\u003cp class=\"has-medium-font-size\" data-mce-fragment=\"1\"\u003eThe Cambium Networks wireless fabric portfolio of solutions now includes:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/wifi\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/wifi\/\"\u003eHigh-Capacity Wi-Fi access points\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-cloud\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-cloud\/\"\u003eXMS cloud management\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-enterprise\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-enterprise\/\"\u003eXMS enterprise on-premises management\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/wifi-designer\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/wifi-designer\/\"\u003eWi-Fi Designer\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/value-profiler\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/value-profiler\/\"\u003eValue Profiler\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e","published_at":"2023-02-18T08:39:54+08:00","sort_order":"best-selling","template_suffix":"xirrus","disjunctive":false,"rules":[{"column":"vendor","relation":"contains","condition":"Xirrus"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:55:54+08:00","alt":"Cambium Network Xirrus","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Cambium-Network-Xirrus-6013.png?v=1690548955"}},{"id":445760045346,"handle":"certifiers","title":"Certifiers","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eA cable certifier is a device designed to measure the integrity and transmission characteristics of cabling. A cable certifier can perform various functions to test network cabling for compliance with cabling standards developed by bodies such as the Telecommunications Industry Association (TIA) and the International Organization for Standardization (ISO) to name a few. A cable certifier is useful to local area network (LAN) administrators, cable installers, and field service providers for testing and certifying cabling installations as compliant with these standards.\u003c\/span\u003e","published_at":"2023-05-23T15:39:51+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Certifiers"}],"published_scope":"web"},{"id":445590438178,"handle":"certifiers-qualifiers-and-verifiers","title":"Certifiers, Qualifiers and Verifiers","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp class=\"rich-text__heading rte h1\"\u003e\u003cstrong\u003ePrevent unplanned network outages now\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eYour reliable source for testing, qualifying and certifying cabling networks based on global technological standards.\u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-05-22T12:19:48+08:00","sort_order":"best-selling","template_suffix":"certifiers-qualifiers","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Certifiers, Qualifiers and Verifiers"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:55:56+08:00","alt":"Certifiers, Qualifiers and Verifiers","width":1280,"height":720,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Certifiers-Qualifiers-and-Verifiers-4751.jpg?v=1690548957"}},{"id":456795259170,"handle":"clearance","title":"Clearance","updated_at":"2023-09-22T04:33:43+08:00","body_html":"","published_at":"2023-08-30T16:41:07+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Clearance"}],"published_scope":"web"},{"id":439805706530,"handle":"cloud-managed-networking","title":"Cloud Managed Networking","updated_at":"2023-07-28T21:04:57+08:00","body_html":"\u003cp\u003eReduce Risk and Simplify Operations by Managing 1 Network from 1 Cloud\u003c\/p\u003e","published_at":"2023-03-25T13:01:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Cloud Managed Networking"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:04:57+08:00","alt":"Cloud Managed Networking","width":1980,"height":660,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Cloud-Managed-Networking-8313.jpg?v=1690549497"}},{"id":443039580450,"handle":"cloud-management","title":"Cloud Management","updated_at":"2023-09-19T02:00:01+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eManage thousands of infrastructure devices across wired, wireless, SD-WAN, IoT, and 3rd party from a single cloud instance along with enhanced data capabilities.\u003c\/span\u003e","published_at":"2023-04-27T19:50:24+08:00","sort_order":"best-selling","template_suffix":"network-management","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Network Management"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:04:59+08:00","alt":"Cloud Management","width":1000,"height":565,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Cloud-Management-1874.jpg?v=1690549499"}},{"id":439410032930,"handle":"collaboration","title":"Collaboration","updated_at":"2023-07-28T21:04:56+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\u003cspan\u003eEnjoy higher productivity and complete projects faster together\u003c\/span\u003e\u003c\/h2\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eMeetings end, but teamwork must continue. Avaya Spaces connects you with all your people and tools—all in one place, as long as you need. Meet, call, chat, share files, manage tasks. All wrapped in real-time notifications.\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003e\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-03-21T22:37:34+08:00","sort_order":"best-selling","template_suffix":"collaboration","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Collaboration"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:04:55+08:00","alt":"Collaboration","width":600,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Collaboration-1503.png?v=1690549496"}},{"id":455830208802,"handle":"commscope","title":"Commscope","updated_at":"2023-09-21T16:32:30+08:00","body_html":"","published_at":"2023-08-22T10:42:18+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Commscope"}],"published_scope":"web"},{"id":436722139426,"handle":"conference-phones","title":"Conference Phones","updated_at":"2023-09-04T20:07:36+08:00","body_html":"","published_at":"2023-02-19T23:58:19+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Conference Phones"}],"published_scope":"web"},{"id":443377975586,"handle":"controller","title":"Controller","updated_at":"2023-09-06T06:14:31+08:00","body_html":"\u003cp\u003e\u003cspan\u003eHigh-performance, enterprise-class WLAN appliances\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntegrated management, security, and dynamic performance optimization \u003c\/li\u003e\n\u003cli\u003eScalable range of solutions tailor-made for every enterprise environment\u003c\/li\u003e\n\u003cli\u003eDelivers agile, available, and context-aware network access\u003c\/li\u003e\n\u003c\/ul\u003e","published_at":"2023-05-01T18:26:18+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Controller"},{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"}],"published_scope":"web"},{"id":445524705570,"handle":"copper-certifiers-qualifiers-and-verifiers","title":"Copper | Certifiers, qualifiers and verifiers","updated_at":"2023-08-31T17:32:24+08:00","body_html":"Despite the latest developments in fiber optic cable technology, copper is still the most common medium network installers and system administrators deal with on a daily basis. New transmission classes always present new challenges for measurement technology. In order to carry out correct measurements, both the correct measurement setup and the suitable measuring instrument are important.","published_at":"2023-05-21T17:16:05+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Copper"},{"column":"vendor","relation":"equals","condition":"Softing"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:15:22+08:00","alt":"Copper | Certifiers, qualifiers and verifiers","width":1150,"height":1206,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Copper-Certifiers-qualifiers-and-verifiers-584.png?v=1690550123"}},{"id":436612530466,"handle":"crestron","title":"Crestron","updated_at":"2023-09-05T02:57:13+08:00","body_html":"Crestron designs and engineers best-in-class hardware and software to work together as a single solution. Built on standard infrastructure, our technology is easy to install and use, scalable, repeatable, and manageable.","published_at":"2023-02-18T08:45:53+08:00","sort_order":"best-selling","template_suffix":"crestron","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Crestron"}],"published_scope":"web","image":{"created_at":"2023-07-31T00:07:20+08:00","alt":null,"width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_1000_x_500_px_-3.png?v=1690733240"}},{"id":444409741602,"handle":"devices-phones","title":"Devices \u0026 Phones","updated_at":"2023-09-18T02:50:40+08:00","body_html":"Ensure the best communications experience. Find Avaya devices and phones for every space and user type in your business.","published_at":"2023-05-12T22:28:39+08:00","sort_order":"best-selling","template_suffix":"devices-phones","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Analog Phone"},{"column":"type","relation":"equals","condition":"Conference Phone"},{"column":"type","relation":"equals","condition":"IP Phone"},{"column":"type","relation":"equals","condition":"Digital Phone"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:15:20+08:00","alt":"Devices \u0026 Phones","width":1536,"height":1024,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Devices-Phones-3952.jpg?v=1690550120"}},{"id":436585759010,"handle":"digital-signage-iptv-system","title":"Digital Signage","updated_at":"2023-07-28T21:15:14+08:00","body_html":"\u003csection class=\"shopify-section section\" id=\"shopify-section-template--18251802542370__e5b1db65-ad14-4037-82eb-d39c155340cd\"\u003e\n\u003cdiv class=\"isolate\"\u003e\n\u003cdiv class=\"rich-text content-container color-background-1 gradient rich-text--full-width content-container--full-width section-template--18251802542370__e5b1db65-ad14-4037-82eb-d39c155340cd-padding\"\u003e\n\u003cdiv class=\"rich-text__wrapper rich-text__wrapper--center page-width\"\u003e\n\u003cdiv class=\"rich-text__blocks center\"\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\u003cspan\u003eEye-catching commercial displays that make your brand and business stand out\u003c\/span\u003e\u003c\/h2\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eElectronic displays in high-traffic areas are changing the face of our public spaces and the possibilities for digital signage are everywhere. Whether used for informational messaging, advertising, entertainment or architectural ambiance, these digital signage displays can transform the experiences of shopping, working and socializing.\u003c\/p\u003e\n\u003cp\u003eInteractive and touch displays will take your digital signage to the next level. Create a personal experience for your viewer to help them better remember your brand and message.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/section\u003e\n\u003csection class=\"shopify-section section\" id=\"shopify-section-template--18251802542370__cd3daeba-876c-4775-a3aa-68880901ce89\"\u003e\n\u003cdiv class=\"isolate\"\u003e\n\u003cdiv class=\"rich-text content-container color-background-1 gradient rich-text--full-width content-container--full-width section-template--18251802542370__cd3daeba-876c-4775-a3aa-68880901ce89-padding\"\u003e\n\u003cdiv class=\"rich-text__wrapper rich-text__wrapper--center page-width\"\u003e\n\u003cdiv class=\"rich-text__blocks center\"\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\u003cspan\u003eYour Digital Signage Solutions All In One Place\u003c\/span\u003e\u003c\/h2\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eWe work with a variety of software and equipment vendors to ensure that every digital signage project is specifically designed to best support the unique location, content and ongoing management requirements for each customers.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003eRoom Scheduling\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eLets your workforce quickly book the right space with the right technology. All while helping you manage occupation density and providing utilization data for better real estate planning.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003eWayfinding\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eContextual signage makes it easy for visitors to know where they are and how to get where they are going. Wayfinding signage can switch during emergencies to displaying safety information, evacuation plans and directions to the closest emergency exits.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003eDigital Posters \u0026amp; Advertisements\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eGet your business a window poster, that is displayed on a screen instead of on paper or clings. It can let you share more messages in the same space with a slideshow-style group of promotions. Unlike standard window signage, they are lit so that they can be viewed even at night and will cut through glare far better than paper. \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/section\u003e","published_at":"2023-02-18T00:30:21+08:00","sort_order":"best-selling","template_suffix":"digitalsignage","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Digital Signage"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:15:13+08:00","alt":"Digital Signage","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Digital-Signage-3443.jpg?v=1690550114"}},{"id":440135221538,"handle":"dm-nvx®-av-over-ip","title":"DM NVX® AV-over-IP","updated_at":"2023-09-05T02:57:42+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eContent drives everything we do–at work, at school and at play. Distributing content is what DM NVX AV-over-IP does for every type of organization–flawlessly and securely. It is the industry leader that sets the standard. There’s no challenge a DM NVX solution cannot meet, no type of content it can’t distribute–across campuses, throughout offices and around the world.\u003c\/span\u003e","published_at":"2023-03-29T11:11:00+08:00","sort_order":"best-selling","template_suffix":"dm-nvx-av-over-ip","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"DM NVX® AV-over-IP"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:15:18+08:00","alt":"DM NVX® AV-over-IP","width":879,"height":879,"src":"\/\/v-network.net\/cdn\/shop\/collections\/DM-NVX-AV-over-IP-5123.jpg?v=1690550118"}},{"id":443305165090,"handle":"dptech","title":"DPtech","updated_at":"2023-07-28T21:25:45+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003eDPtech ADX addresses the increasing number of users and their growingly higher requirements for application.\u003c\/p\u003e\n\u003cp\u003eDPtech, built on core technologies of independent intellectual property rights, has launched more than 100 products in a dozen categories. Its products include Deep Service Switching Gateway (DPX), Application Firewall (FW), Intrusion Prevention System (IPS), Anti-DDoS System (Guard\/Probe), Web Application Firewall (WAF), Unified Audit Gateway (UAG), Application Delivery Platform (ADX), switches and routers.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eIn addition, DPtech has further introduced a number of scenario-based solutions for typical application scenarios, including secure network Solution, Self-Secure Branch Offices Solution, Secure IoT Solution, Secure Cloud Data Center Solution featuring “strong power enabled by Cloud security”, and the Internet Egress Solution featuring “Integration, Intelligentization, Easy Management, and Reliable Connection”.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-05-01T00:12:46+08:00","sort_order":"best-selling","template_suffix":"dptech","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"DPtech"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:25:44+08:00","alt":"DPtech","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/DPtech-9017.png?v=1690550745"}},{"id":443290845474,"handle":"endpoint-security","title":"EndPoint Security","updated_at":"2023-09-22T16:56:39+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eModern endpoint protection is designed to provide security against the latest threats no matter where the endpoint sits.\u003c\/p\u003e\n\u003cp\u003eCapture Client’s integration with the Capture Security Center creates a single pane of glass across network and endpoint security operations for centralized control of attack visualization, rollback and remediation, network control and remote shell troubleshooting abilities.\u003c\/p\u003e","published_at":"2023-04-30T19:52:34+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"EndPoint Security"}],"published_scope":"web"},{"id":439408525602,"handle":"enterprise-room-solutions","title":"Enterprise Room Solutions","updated_at":"2023-07-28T21:25:42+08:00","body_html":"\u003cp\u003e\u003cspan\u003eRoom automation makes seamless meetings possible.\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003evnetwork integrates automation and control solutions such as Audio Visual, lighting, shading, security, voice-activated assistants and Building Management Systems, so you can control everything from one platform. From individual room scheduling with easy Outlook integration, to full room control through a single base station, and integration with popular audio equipment manufacturers, the customization for your room automation is endless.\u003c\/p\u003e\n\u003cp\u003eRoom automation makes seamless meetings possible, since you will never have to leave your seat to adjust the lighting during a presentation. You can also unlock or close the door to your office or meeting room, for an added convenience and increased security.\u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-03-21T22:27:27+08:00","sort_order":"best-selling","template_suffix":"enterprise-room-solutions","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Enterprise Room Solutions"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:25:41+08:00","alt":"Enterprise Room Solutions","width":600,"height":400,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Enterprise-Room-Solutions-2283.webp?v=1690550742"}},{"id":443139293474,"handle":"entrypass","title":"Entrypass","updated_at":"2023-07-28T21:25:43+08:00","body_html":"","published_at":"2023-04-28T20:27:38+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Entrypass"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:25:43+08:00","alt":"Entrypass","width":800,"height":800,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Entrypass-8384.jpg?v=1690550743"}},{"id":445760209186,"handle":"ethernet","title":"Ethernet | Certifiers, qualifiers and verifiers","updated_at":"2023-08-29T22:22:40+08:00","body_html":"\u003cp\u003eJust a few years ago, wireless networks were rather the exception in companies. If at all, there were only small Wi-Fi islands, which were not considered conceptually in the planning of the enterprise network. Wi-Fi often meant only one access point in conference rooms. In the current age of smartphones and tablets and the resulting enormous increase in mobile data usage, fast, reliable and consistent Wi-Fi coverage is a must for a company. Multiple connections must be made simultaneously, buildings can be complex, network requirements are constantly changing, and future data rates and standards must be considered.\u003c\/p\u003e\n\n\n","published_at":"2023-05-23T15:41:16+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Ethernet"}],"published_scope":"web"},{"id":444209004834,"handle":"extreme-fabric","title":"Extreme Fabric","updated_at":"2023-09-27T04:12:39+08:00","body_html":"","published_at":"2023-05-10T23:55:49+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"contains","condition":"Switch"},{"column":"vendor","relation":"equals","condition":"Extreme Networks"}],"published_scope":"web"},{"id":436612202786,"handle":"extreme-networks","title":"Extreme Networks","updated_at":"2023-09-27T04:12:39+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eThe modern enterprise demands network agility, scalability, and security—but without the complexity. Extreme Fabric provides a Unified, Automated, and Secure solution that extends across multiple locations and device types, as well as streamlining deployments while isolating threats.\u003c\/span\u003e\n\u003cp\u003e \u003c\/p\u003e","published_at":"2023-02-18T08:42:20+08:00","sort_order":"best-selling","template_suffix":"extreme-network","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Extreme Networks"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:37:50+08:00","alt":"Extreme Networks","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Extreme-Networks-9297.png?v=1690551470"}},{"id":444312092962,"handle":"extreme-wireless","title":"Extreme Wireless","updated_at":"2023-07-03T12:51:49+08:00","body_html":"\u003cdiv class=\"c-content-section__content\"\u003e\n\u003cp\u003eWith the broadest family of next-generation cloud-managed Wi-Fi access points, Extreme Networks is helping customers accelerate in every environment\u003c\/p\u003e\n\u003c\/div\u003e\n\u003cul class=\"c-content-section__cta-list\"\u003e\u003c\/ul\u003e","published_at":"2023-05-11T22:53:25+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Extreme Network"},{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"},{"column":"tag","relation":"equals","condition":"Extreme Wireless"}],"published_scope":"web"},{"id":444307636514,"handle":"extremecloud-iq","title":"ExtremeCloud IQ","updated_at":"2023-09-25T18:30:24+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eDesigned to streamline every aspect of your network from deployment to maintenance, \u003c\/span\u003e\u003cstrong\u003eExtremeCloud™ IQ\u003c\/strong\u003e\u003cspan\u003e has been built with the human element in mind, helping IT and business focus on what’s really important to them instead of dealing with menial and time consuming operational tasks.\u003c\/span\u003e","published_at":"2023-05-11T22:17:09+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"title","relation":"contains","condition":"ExtremeCloud"}],"published_scope":"web"},{"id":443039514914,"handle":"fabric-connect-switches","title":"Fabric Connect Switches","updated_at":"2023-09-06T06:14:27+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eThe modern enterprise demands network agility, scalability, and security—but without the complexity. Extreme Fabric provides a Unified, Automated, and Secure solution that extends across multiple locations and device types, as well as streamlining deployments while isolating threats.\u003c\/span\u003e","published_at":"2023-04-27T19:49:28+08:00","sort_order":"best-selling","template_suffix":"fabric-connect-switches","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Extreme Fabric"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:37:52+08:00","alt":"Fabric Connect Switches","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Fabric-Connect-Switches-565.png?v=1690551473"}},{"id":445524771106,"handle":"fiber-certifiers-qualifiers-and-verifiers","title":"Fiber | Certifiers, qualifiers and verifiers","updated_at":"2023-08-31T17:32:44+08:00","body_html":"\u003cspan\u003eA reliably functioning IT infrastructure forms the backbone of our modern information age. Especially in data centers, but also in the backbone area of companies and in campus cabling, more and more fiber optic technology is being used today. With increasing bandwidths and ever higher demands on fiber optic cabling, it is no longer sufficient to simply plug cables together and assume that everything will work. The fast and reliable testing of this cabling becomes an absolute \"must\".\u003c\/span\u003e","published_at":"2023-05-21T17:17:32+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Fiber Optics"},{"column":"vendor","relation":"equals","condition":"Softing"}],"published_scope":"web"},{"id":439680008482,"handle":"fiber-optic","title":"Fibre Optic Cabling","updated_at":"2023-07-28T21:46:15+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eFiber optic cabling is frequently used when connecting multiple IDF locations together within a large space, for providing connections that span far distances that exceed what standard Category 5e\/6\/6a cabling can cover, or if a higher speed connection is required.\u003c\/p\u003e\n\u003cp\u003eA fiber optic cable consists of multiple glass cores. Each core is thinner than a human hair and is capable of transmitting data through light waves and achieving higher transmission speeds over a longer distance.\u003c\/p\u003e","published_at":"2023-03-24T00:46:53+08:00","sort_order":"best-selling","template_suffix":"fibreoptic","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Fibre Optic Cabling"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:46:15+08:00","alt":"Fibre Optic Cabling","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Fibre-Optic-Cabling-6401.png?v=1690551975"}},{"id":459324064034,"handle":"firewall","title":"Firewall","updated_at":"2023-09-22T16:56:40+08:00","body_html":"","published_at":"2023-09-17T02:33:11+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Firewall"}],"published_scope":"web"},{"id":436686225698,"handle":"fwaas","title":"Firewall-As-A-Service (FWaaS)","updated_at":"2023-07-28T21:46:10+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork offers comprehensive firewall solutions as a service, ensuring enhanced network security, intrusion prevention, and threat management without the need for on-premises firewall equipment.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:06:34+08:00","sort_order":"best-selling","template_suffix":"fwaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Firewall-As-A-Service (FWaaS)"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:46:09+08:00","alt":"Firewall-As-A-Service (FWaaS)","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Firewall-As-A-Service-FWaaS-9551.png?v=1690551970"}},{"id":436551090466,"handle":"frontpage","updated_at":"2023-09-06T14:18:31+08:00","published_at":"2023-02-17T18:02:50+08:00","sort_order":"best-selling","template_suffix":null,"published_scope":"web","title":"Home page","body_html":null},{"id":439407903010,"handle":"hospitality-iptv","title":"Hospitality IPTV","updated_at":"2023-07-28T21:46:13+08:00","body_html":"\u003cspan data-mce-fragment=\"1\"\u003eWith our IPTV Hospitality solution, your guests are welcomed into their room with a personalised, interactive and intuitive interface. Bring your televisions to life, offer new services, and improve the overall guest experience.\u003c\/span\u003e","published_at":"2023-03-21T22:22:54+08:00","sort_order":"best-selling","template_suffix":"iptv","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Hospitality IPTV"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:46:12+08:00","alt":"Hospitality IPTV","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Hospitality-IPTV-6316.png?v=1690551973"}},{"id":443545714978,"handle":"husky-ivo","title":"Husky IVO™","updated_at":"2023-06-03T16:35:56+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eWhy is the new Husky IVO the best choice for your business? The support, the easy installation, and the products themselves work together to ensure you get the most out of your video management software (VMS).\u003c\/span\u003e\u003cbr\u003e\u003c\/p\u003e","published_at":"2023-05-03T14:16:16+08:00","sort_order":"best-selling","template_suffix":"husky","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Husky IVO"}],"published_scope":"web"},{"id":443049574690,"handle":"hybrid-phone-system","title":"Hybrid Phone System","updated_at":"2023-07-28T21:59:43+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eThe cloud can deliver what you need, but maybe you aren’t ready for a full-cloud solution. Avaya’s hybrid cloud options let you move at your pace. Start by just adding cloud capabilities to your on-premises platform. Or take a faster path to the cloud with an environment that’s built just for you.\u003c\/span\u003e\u003c\/p\u003e\n\u003ch3 class=\"title-h2\"\u003e\n\u003cbr\u003eOn-premises solutions, meet cloud\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cdiv class=\"global-bullets\"\u003e\n\u003cp\u003eDeliver an enriched customer experience by adding a cloud-based solution to what you already have—like Avaya Aura Platform. No need to rip and replace.\u003c\/p\u003e\n\u003cp\u003eLayer on innovations of the Avaya Experience Platform. Let customers connect how they want. Give employees all the tools to meet customers’ needs.\u003cbr\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3 class=\"title-h2\"\u003eYour cloud, your way\u003c\/h3\u003e\n\u003cdiv class=\"global-bullets\"\u003e\n\u003cp\u003eFirst, transition your current on-premises platform to Avaya Enterprise Cloud. You keep the familiar Avaya solution you have now—such as Avaya Aura Platform and Avaya Call Center Elite— just in a dedicated instance on Microsoft Azure, the market-leading cloud that delivers savings, scalability, and security. There’s no disruption for customers and no training needed for employees. \u003c\/p\u003e\n\u003cp\u003eNext, easily modernize your customer experience by adding Avaya Experience Platform capabilities.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T22:23:25+08:00","sort_order":"best-selling","template_suffix":"hybrid-phone-system","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Hybrid Phone System"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:43+08:00","alt":"Hybrid Phone System","width":1200,"height":801,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Hybrid-Phone-System-7757.jpg?v=1690552783"}},{"id":439809736994,"handle":"inteliphy-net","title":"inteliPhy net","updated_at":"2023-07-28T21:59:39+08:00","body_html":"inteliPhy net is your easy-to-use DCIM solution for asset, capacity and change management.","published_at":"2023-03-25T15:02:33+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"inteliPhy net"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:38+08:00","alt":"inteliPhy net","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/inteliPhy-net-4280.jpg?v=1690552779"}},{"id":443049541922,"handle":"ip-office","title":"IP Office","updated_at":"2023-09-17T21:55:22+08:00","body_html":"\u003ch3\u003e\u003cspan\u003e\u003cmeta charset=\"UTF-8\"\u003e \u003cstrong\u003ePerfect communications solution for small and medium-size businesses \u003c\/strong\u003e\u003c\/span\u003e\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eStudy your customer calls by setting up call recording, tracking, and reporting. This Avaya Call Reporting capability can be delivered through IP Office to record and document incoming calls. You can also add real-time call center agent seats and dashboards for more efficient call handling.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003eCombine \u003ca href=\"https:\/\/www.avaya.com\/en\/products\/ip-office\/\" data-mce-href=\"https:\/\/www.avaya.com\/en\/products\/ip-office\/\" target=\"_blank\"\u003eAvaya IP Office\u003c\/a\u003e with a subscription for \u003ca href=\"https:\/\/www.avaya.com\/en\/products\/ucaas\/spaces\/\" data-mce-href=\"https:\/\/www.avaya.com\/en\/products\/ucaas\/spaces\/\" target=\"_blank\"\u003eAvaya Spaces\u003c\/a\u003e and you gain a single app for voice, video, messaging, conferencing, and a calendar—all available on any device, in any location. \u003c\/p\u003e","published_at":"2023-04-27T22:23:11+08:00","sort_order":"best-selling","template_suffix":"ip-office","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"IP Office"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:40+08:00","alt":"IP Office","width":1024,"height":1024,"src":"\/\/v-network.net\/cdn\/shop\/collections\/IP-Office-702.jpg?v=1690552781"}},{"id":445302735138,"handle":"ip-phone-system","title":"IP Phone System","updated_at":"2023-08-17T23:22:07+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eAvaya IP Office phone system is the right choice for any small and medium size business today—whether you have 5, 25 or 250 employees, just getting started or already established, regardless you have a single office or multiple locations.\u003c\/span\u003e","published_at":"2023-05-19T14:50:29+08:00","sort_order":"best-selling","template_suffix":"ip-phone-system","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"IP Phone System"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:44+08:00","alt":"IP Phone System","width":755,"height":463,"src":"\/\/v-network.net\/cdn\/shop\/collections\/IP-Phone-System-3491.webp?v=1690552785"}},{"id":436612268322,"handle":"ironyun","title":"IronYun","updated_at":"2023-07-28T21:59:37+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eThe Vaidio AI Vision Platform from IronYun USA adds intelligence for security, safety, health, and operations to any IP camera and dozens of market-leading video management systems - at a fraction of the cost of proprietary systems.\u003c\/span\u003e","published_at":"2023-02-18T08:43:05+08:00","sort_order":"best-selling","template_suffix":"ironyun","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"IronYun"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:36+08:00","alt":"IronYun","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/IronYun-4957.png?v=1690552777"}},{"id":443207024930,"handle":"large-enterprise","title":"Large Enterprise","updated_at":"2023-09-17T04:09:44+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eThe SonicWall Network Security services platform (NS\u003cem\u003esp\u003c\/em\u003e) High-End Firewall series delivers the advanced threat protection, fast speeds and budget friendly price that large enterprises, data centers, and service providers demand. Options from multi-instance architectures to unified policy creation makes defending your environment simpler and more effective. It’s security without compromise.\u003c\/p\u003e\n\u003cp\u003eDesigned for large distributed enterprises, data centers, government agencies and service providers, the NS\u003cem\u003esp\u003c\/em\u003e High-End series, pairs advanced technologies like Real-Time Deep Memory Inspection (RTDMI™) with high-speed performance.\u003c\/p\u003e","published_at":"2023-04-29T16:07:12+08:00","sort_order":"best-selling","template_suffix":"large-enterprise","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Large Enterprise"},{"column":"vendor","relation":"equals","condition":"SonicWall"}],"published_scope":"web"},{"id":436612301090,"handle":"legrand","title":"Legrand","updated_at":"2023-07-28T22:07:55+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eLegrand is specialised in electrical and digital building infrastructures, which offer high value-added products and solutions that improve lives by transforming the spaces where people live, work and meet.\u003c\/p\u003e\n\u003cp\u003eWith a wide range of more than 300,000 references of products and solutions in over 100 product families, Legrand improves lives by offering simple, innovative, sustainable solutions for every type of building around the world in various industires.\u003c\/p\u003e","published_at":"2023-02-18T08:43:28+08:00","sort_order":"best-selling","template_suffix":"legrand","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Legrand"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:07:55+08:00","alt":"Legrand","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Legrand-5882.png?v=1690553275"}},{"id":439408656674,"handle":"lighting-occupancy-sensors","title":"Lighting \u0026 Occupancy Sensors","updated_at":"2023-07-28T22:08:02+08:00","body_html":"","published_at":"2023-03-21T22:28:27+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Lighting \u0026 Occupancy Sensors"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:08:01+08:00","alt":"Lighting \u0026 Occupancy Sensors","width":1388,"height":1388,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Lighting-Occupancy-Sensors-3474.jpg?v=1690553282"}},{"id":436612628770,"handle":"linkbroad","title":"LinkBroad","updated_at":"2023-07-31T20:50:08+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003eLinkBroad Interactive TV System Solution is a cutting-edge, interactive digital TV solution meticulously crafted to meet the unique needs of high-end hotels and their discerning guests. The solution is the result of extensive research into hotel room TVs and the lifestyles of hotel guests, ensuring a deep understanding of their preferences.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eAt the heart of the offering is the BroadView system, complemented by the advanced PMS technology of HSIA. Through seamless integration with the dominant PMS system in high-end hotels, Oracle Opera, the Interactive TV Solution delivers a cohesive and unparalleled experience. We provide hotels with a comprehensive package that includes the BroadView system, top-of-the-line network equipment, and a range of services such as consultation, design planning, installation, training, and ongoing support.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eChoose LinkBroad Interactive TV System Solution and elevate your hotel's entertainment offerings with a dynamic and interactive platform that captivates guests while delivering valuable information and enhancing their overall experience.\u003c\/p\u003e","published_at":"2023-02-18T08:46:54+08:00","sort_order":"best-selling","template_suffix":"linkbroad","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"LinkBroad"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:07:59+08:00","alt":"LinkBroad","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/LinkBroad-8201.png?v=1690807808"}},{"id":436612596002,"handle":"lutron","title":"Lutron","updated_at":"2023-09-16T05:21:34+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eLutron offers you comprehensive energy-saving and comfort-control solutions—for light, shade, and temperature—as well as intelligent building integration for all your properties across the globe.\u003c\/p\u003e\n\u003cp\u003eLutron delivers the ideal experience every time. Here's the highlight specific Lutron solutions for each space in your hotel property.\u003c\/p\u003e","published_at":"2023-02-18T08:46:34+08:00","sort_order":"best-selling","template_suffix":"lutron","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Lutron"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:07:57+08:00","alt":"Lutron","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Lutron-6552.png?v=1690553277"}},{"id":436684488994,"handle":"managed-services","title":"Managed Services","updated_at":"2023-06-03T16:35:53+08:00","body_html":"","published_at":"2023-02-19T09:56:35+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Managed Services"}],"published_scope":"web"},{"id":443206926626,"handle":"mid-sized-enterprise","title":"Mid-Sized Enterprise","updated_at":"2023-09-17T04:09:44+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eDefeating advanced threats requires an advanced firewall solution built for the needs of your business. The SonicWall Network Security appliance (NS\u003cem\u003ea\u003c\/em\u003e) Mid-Range Firewall is next-generation security designed specifically for businesses of 250 users and up. Work with the confidence of knowing you’re protected against the day-to-day incursions as well as against advanced threats like ransomware, attacks against non-standard ports, and breaches in firewalls, all at the speed of business.\u003c\/p\u003e\n\u003cp\u003eWith cloud-based and on-box capabilities like TLS\/SSL decryption and inspection, application intelligence and control, secure SD-WAN, real-time visualization, and WLAN management, SonicWall provides flexible, fast and cost-effective security to keep the threats out and your business thriving.\u003c\/p\u003e","published_at":"2023-04-29T16:06:54+08:00","sort_order":"best-selling","template_suffix":"mid-sized-enterprise","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Mid-Sized Enterprise"},{"column":"vendor","relation":"equals","condition":"SonicWall"}],"published_scope":"web"},{"id":436612333858,"handle":"milestone","title":"Milestone","updated_at":"2023-09-07T18:08:14+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eMilestone provides actionable insights from video data through the perfect combination of your cameras and sensors and our open platform software and analytics. – always with a responsible mindset and a people-first approach.\u003c\/span\u003e","published_at":"2023-02-18T08:43:50+08:00","sort_order":"manual","template_suffix":"milestone","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Milestone"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:20:03+08:00","alt":"Milestone","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Milestone-5811.png?v=1690554003"}},{"id":439809507618,"handle":"netscale-48","title":"Netscale 48","updated_at":"2023-07-28T22:20:07+08:00","body_html":"Perfect flexibility, mixed media patch panel","published_at":"2023-03-25T14:58:10+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Netscale 48"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:20:07+08:00","alt":"Netscale 48","width":768,"height":432,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Netscale-48-6384.jpg?v=1690554007"}},{"id":439809474850,"handle":"netscale72","title":"Netscale 72","updated_at":"2023-07-28T22:20:05+08:00","body_html":"Flexible. Dense and automated.","published_at":"2023-03-25T14:57:27+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Netscale72"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:20:05+08:00","alt":"Netscale 72","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Netscale-72-8436.jpg?v=1690554005"}},{"id":439946510626,"handle":"network-security","title":"Network \u0026 Security","updated_at":"2023-09-19T02:00:12+08:00","body_html":"\u003cspan\u003eWe offer wired and wireless access solutions including switches, access points, and cloud services. Leveraging these solutions, IT teams can streamline operations and simplify user and device troubleshooting, while delivering innovative and strategic projects with IoT and location services.\u003c\/span\u003e","published_at":"2023-03-27T13:40:44+08:00","sort_order":"best-selling","template_suffix":"network-security","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Network Switches"},{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"},{"column":"type","relation":"equals","condition":"Network Management"},{"column":"type","relation":"equals","condition":"Self-Secure Networking"},{"column":"type","relation":"equals","condition":"NextGen Firewall \u0026 End Point Security"},{"column":"type","relation":"equals","condition":"Secure Mobile Access"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:41+08:00","alt":"Network \u0026 Security","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-Security-9390.jpg?v=1690554642"}},{"id":439676043554,"handle":"network-cabling","title":"Network Cabling","updated_at":"2023-07-28T22:30:40+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cstrong\u003eVoice and data cabling is a critical piece of infrastructure.— It’s the backbone that gets, and keeps, your network and all network devices up and running.\u003c\/strong\u003e\u003c\/p\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/h2\u003e\n\u003cp class=\"rich-text__heading rte h2\"\u003e\u003cstrong\u003eWhat is Voice and Data Cabling?\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eVoice and data cabling is also known as structured cabling or ethernet cabling, and consists of having the right cables installed in the right way and at the right locations to allow for transferring data to the right places. These cables are the center of a network that powers computer systems, connects wireless devices, phone systems, copiers, and more. \u003c\/p\u003e\n\u003cp\u003ePhysical cables of various types run from individual equipment to a centralized hub (i.e. server room, telecom closet, etc.). They run behind walls, above ceiling tiles, and even under raised flooring. All to ensure that businesses can keep communication flowing, both within and outside of their physical walls. \u003c\/p\u003e\n\u003cp\u003eCompanies of all sizes can benefit from a structured voice and data cabling system. \u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-03-23T23:48:20+08:00","sort_order":"best-selling","template_suffix":"network-cabling","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Network Cabling"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:40+08:00","alt":"Network Cabling","width":1300,"height":731,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-Cabling-8331.webp?v=1690554640"}},{"id":438345072930,"handle":"network-camera","title":"Network Camera","updated_at":"2023-09-04T20:49:41+08:00","body_html":"\u003cp\u003eToday’s organizations face an increasing number of security breaches—and the intensity of these threats is on the rise, too. People understand the reality that video surveillance plays in modern society.\u003c\/p\u003e\n\u003cp\u003eChoosing the right video surveillance system for your business can be challenging when you don’t know what to look for. From traditional local video surveillance to IP systems and cloud-based storage options, the experts at vnetwork can design, install, service and monitor the right video system for your needs.\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003c\/p\u003e","published_at":"2023-03-10T11:26:08+08:00","sort_order":"best-selling","template_suffix":"network-camera","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Network Camera"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:37+08:00","alt":"Network Camera","width":1280,"height":720,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-Camera-7618.png?v=1690554638"}},{"id":436686094626,"handle":"naas","title":"Network-As-A-Service (NaaS)","updated_at":"2023-07-28T22:30:36+08:00","body_html":"\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork delivers network infrastructure and management as a service, allowing organizations to leverage a robust and scalable network environment without the burden of hardware ownership and maintenance.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:04:55+08:00","sort_order":"best-selling","template_suffix":"naas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Network-As-A-Service (NaaS)"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:35+08:00","alt":"Network-As-A-Service (NaaS)","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-As-A-Service-NaaS-9615.png?v=1690554636"}},{"id":436612366626,"handle":"newbridge","title":"NewBridge","updated_at":"2023-09-05T18:43:49+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eNewbridge provides the most affordable and reliable enterprise level wireless solution for all businesses.\u003c\/span\u003e","published_at":"2023-02-18T08:44:11+08:00","sort_order":"best-selling","template_suffix":"newbridge","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"NewBridge"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:32+08:00","alt":"NewBridge","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NewBridge-9681.png?v=1690732630"}},{"id":443039744290,"handle":"ngfw-end-point-security","title":"NGFW \u0026 EndPoint Security","updated_at":"2023-09-06T06:36:41+08:00","body_html":"\u003cp\u003e\u003cstrong\u003eAdvanced threat protection, from small businesses to global enterprises and cloud environments. Discover network security made boundless.\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eWhether you’re a small business or a large enterprise, whether in your home or in the cloud, SonicWall next-generation firewalls (NGFW) provide the security, control and visibility you need to maintain an effective cybersecurity posture. SonicWall’s award-winning hardware and advanced technology are built into each firewall to give you the edge on evolving threats. With solutions designed for networks of all sizes, SonicWall firewalls are designed to meet your specific security and usability needs, all at a cost that will protect your budget while securing your network.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-04-27T19:50:57+08:00","sort_order":"manual","template_suffix":"nextgen-firewall-endpoi","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"NextGen Firewall \u0026 End Point Security"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:01:40+08:00","alt":"NGFW \u0026 EndPoint Security - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NGFW-EndPoint-Security-V-Network-System-392.png?v=1690269244"}},{"id":444361146658,"handle":"nsa","title":"NSa Series Next-Generation Firewall (NGFW)","updated_at":"2023-09-17T04:09:44+08:00","body_html":"\u003cspan\u003eNext-gen security for mid-sized networks without the big-time price tag.\u003c\/span\u003e","published_at":"2023-05-12T10:12:09+08:00","sort_order":"best-selling","template_suffix":"nsa-series","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"NSa Series"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:59+08:00","alt":"NSa Series Next-Generation Firewall (NGFW) - V-Network System","width":1050,"height":593,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NSa-Series-Next-Generation-Firewall-NGFW-V-Network-System-182.png?v=1685592480"}},{"id":444361539874,"handle":"nssp","title":"NSsp Series Next-Generation Firewall (NGFW)","updated_at":"2023-09-17T04:09:44+08:00","body_html":"\u003cspan\u003eWorld-class intelligence. Cutting-edge security. Enterprise-sized networks.\u003c\/span\u003e","published_at":"2023-05-12T10:20:44+08:00","sort_order":"best-selling","template_suffix":"nssp","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"NSsp Series"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:08:01+08:00","alt":"NSsp Series Next-Generation Firewall (NGFW) - V-Network System","width":1050,"height":659,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NSsp-Series-Next-Generation-Firewall-NGFW-V-Network-System-794.png?v=1685592482"}},{"id":439408689442,"handle":"one-touch-control","title":"One-Touch Control","updated_at":"2023-06-03T16:35:54+08:00","body_html":"","published_at":"2023-03-21T22:28:41+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"One-Touch Control"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:55+08:00","alt":"One-Touch Control - V-Network System","width":540,"height":540,"src":"\/\/v-network.net\/cdn\/shop\/collections\/One-Touch-Control-V-Network-System-426.webp?v=1685592476"}},{"id":452514480418,"handle":"pbx-as-a-service-pbxaas","title":"PBX-as-a-Service (PBXaaS)","updated_at":"2023-07-25T00:24:32+08:00","body_html":"\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\" data-mce-fragment=\"1\"\u003evnetwork offers cloud-based PBX solutions, enabling businesses to access advanced telephony features, call management, and voicemail services without the need for physical on-site infrastructure.\u003c\/span\u003e","published_at":"2023-07-25T00:24:31+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"PBXaaS"}],"published_scope":"web","image":{"created_at":"2023-07-25T00:24:30+08:00","alt":null,"width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/X-as-a-Services_1366_x_500_px_-2.png?v=1690215871"}},{"id":455323975970,"handle":"philips-professional-display-solutions","title":"Philips Professional Display Solutions","updated_at":"2023-08-18T00:13:19+08:00","body_html":"","published_at":"2023-08-18T00:11:42+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Philips"}],"published_scope":"web","image":{"created_at":"2023-08-18T00:13:18+08:00","alt":null,"width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/32.png?v=1692288799"}},{"id":439809638690,"handle":"poe-indicator","title":"PoE Indicator","updated_at":"2023-06-03T16:35:55+08:00","body_html":"Don't search - find!","published_at":"2023-03-25T14:59:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"PoE Indicator"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:57+08:00","alt":"PoE Indicator - V-Network System","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/PoE-Indicator-V-Network-System-505.jpg?v=1685592478"}},{"id":439809671458,"handle":"prime-odf","title":"PRIME ODF","updated_at":"2023-06-03T16:35:55+08:00","body_html":"The new generation of optical distribution systems.","published_at":"2023-03-25T15:00:34+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"PRIME ODF"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:14:03+08:00","alt":"PRIME ODF - V-Network System","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/PRIME-ODF-V-Network-System-471.jpg?v=1685592844"}},{"id":439809409314,"handle":"qr-connector-family","title":"QR Connector Family","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003eThe R\u0026amp;M QR connector family offers maximum packing density combined with convenient manipulation.\u003c\/p\u003e","published_at":"2023-03-25T14:55:02+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"QR Connector Family"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:14:01+08:00","alt":"QR Connector Family - V-Network System","width":768,"height":576,"src":"\/\/v-network.net\/cdn\/shop\/collections\/QR-Connector-Family-V-Network-System-727.jpg?v=1685592842"}},{"id":445760078114,"handle":"qualifiers","title":"Qualifiers","updated_at":"2023-08-29T22:22:38+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eCable qualification tools are used to troubleshoot and qualify cabling bandwidth and if existing cabling will support technology requirements like 100BASE-TX, 1000BASE-TX, 10GBASE-T, etc. \u003c\/span\u003e","published_at":"2023-05-23T15:40:03+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Qualifiers"}],"published_scope":"web"},{"id":436612235554,"handle":"r-m","title":"R\u0026M","updated_at":"2023-08-17T23:28:26+08:00","body_html":"\u003cp\u003e\u003cspan\u003eR\u0026amp;M (Reichle \u0026amp; De-Massari AG) is a leading Global cabling and connectivity solution provider for high end-communication networks since 1964. They serve a wide range of industries in the sectors of Local Area Networks, Data Centers and Public Networks.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eR\u0026amp;M covers the entire range of copper-based and fiber-optic connectivity.\u003c\/p\u003e\n\u003cp\u003eThe areas of application for R\u0026amp;M’s infrastructure solutions include:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFixed network, cellular phone networks, 5G and rail\u003c\/li\u003e\n\u003cli\u003eFiber to the Home and smart city\u003c\/li\u003e\n\u003cli\u003eCloud, colocation, edge data centers and Internet Exchange\u003c\/li\u003e\n\u003cli\u003eOffice, industry, smart buildings, Internet of Things\u003c\/li\u003e\n\u003cli\u003eSoftware for infrastructure management\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eClients who opt for R\u0026amp;M invest in sustainably reliable, scalable, and migration-capable infrastructures. The result: \u003cem\u003eNetworks with guaranteed, measurably superior performance\u003c\/em\u003e. The future of digital communication is secured.\u003c\/p\u003e","published_at":"2023-02-18T08:42:40+08:00","sort_order":"best-selling","template_suffix":"r-m","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"R\u0026M"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:13:59+08:00","alt":"R\u0026M - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/R-M-V-Network-System-344.png?v=1690253011"}},{"id":439662641442,"handle":"racking","title":"Racking","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003eCabinets with integrated vertical and horizontal cable management to provide enhanced handling and more space for airflow in your IT infrastructure.\u003c\/p\u003e","published_at":"2023-03-23T21:21:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":true,"rules":[{"column":"tag","relation":"equals","condition":"Blind Cover Click"},{"column":"tag","relation":"equals","condition":"Bracket"},{"column":"tag","relation":"equals","condition":"Modular Plinths"},{"column":"tag","relation":"equals","condition":"Network Cabinets"},{"column":"tag","relation":"equals","condition":"Server Cabinets"}],"published_scope":"web"},{"id":437797126434,"handle":"racking-intelligent-management","title":"Racking \u0026 Intelligent Management","updated_at":"2023-07-25T17:09:22+08:00","body_html":"\u003cspan\u003eCabinets with integrated vertical and horizontal cable management to provide enhanced handling and more space for airflow in your IT infrastructure. Best of breed OM4 and OM5 optical fiber, Cat 6A and Cat 8.1 twisted-pair, and SFP28 and QSFP28 AOC technology meet the bandwidth requirements of upcoming Ethernet applications.\u003c\/span\u003e","published_at":"2023-03-03T22:27:47+08:00","sort_order":"best-selling","template_suffix":"racking-intelligent-management","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Racking \u0026 Intelligent Management"}],"published_scope":"web","image":{"created_at":"2023-07-25T17:06:53+08:00","alt":null,"width":1200,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_1200_x_600_px_23fcc362-abcf-4475-ab24-90275761b387.webp?v=1690276014"}},{"id":443011203362,"handle":"raas","title":"Robotics-as-a Service (RaaS)","updated_at":"2023-07-25T00:10:42+08:00","body_html":"\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork offers robotic solutions on a subscription basis, providing businesses with access to automation and robotics technologies to enhance their operations and improve efficiency.\u003c\/span\u003e","published_at":"2023-04-27T12:53:04+08:00","sort_order":"best-selling","template_suffix":"raas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Robotic-as-a Services (RaaS)"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:19:43+08:00","alt":"Robotics-as-a Service (RaaS) - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Robotics-as-a-Service-RaaS-V-Network-System-208.png?v=1690215042"}},{"id":443461304610,"handle":"room-control-automation","title":"Room Control \u0026 Automation","updated_at":"2023-09-16T05:21:34+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003evnetwork brings you an array of hotel room automation products that aims at improving the stay experience of the guests. \u003c\/span\u003e\u003cbr\u003e","published_at":"2023-05-02T14:45:08+08:00","sort_order":"best-selling","template_suffix":"room-control-automation","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Room Control System"},{"column":"type","relation":"equals","condition":"Hospitality IPTV"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:19:45+08:00","alt":"Room Control \u0026 Automation - V-Network System","width":600,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Room-Control-Automation-V-Network-System-532.webp?v=1685593185"}},{"id":439836967202,"handle":"room-control-system","title":"Room Control System","updated_at":"2023-09-16T05:21:34+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eToday's luxury and full-service hotels must deliver engaging, personalised services to retain guest loyalty. Room Control System for Hotels ensure discerning guests enjoy connectivity and conveniences while driving efficiency with digitally integrated systems insight and management.\u003c\/span\u003e","published_at":"2023-03-26T00:37:34+08:00","sort_order":"best-selling","template_suffix":"room-control-system","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Room Control System"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:19:39+08:00","alt":"Room Control System - V-Network System","width":1200,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Room-Control-System-V-Network-System-836.jpg?v=1690278728"}},{"id":439408591138,"handle":"room-scheduling","title":"Room Scheduling","updated_at":"2023-07-25T16:59:54+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eA pillar of the Crestron Flex digital workplace platform, Crestron Flex Scheduling lets your workforce quickly book the right space with the right technology. All while helping you manage occupation density and providing utilization data for better real estate planning.\u003c\/span\u003e\u003cbr\u003e","published_at":"2023-03-21T22:28:07+08:00","sort_order":"best-selling","template_suffix":"room-scheduling","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Room Scheduling"}],"published_scope":"web","image":{"created_at":"2023-07-25T16:59:54+08:00","alt":null,"width":3000,"height":1721,"src":"\/\/v-network.net\/cdn\/shop\/collections\/image_f800818b-5707-49fe-96ef-e735f3a80aea.webp?v=1690275594"}},{"id":439805870370,"handle":"routing","title":"Routing","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003eSimplified and Secure High-Performance Routing\u003c\/p\u003e","published_at":"2023-03-25T13:05:31+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Routing"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:27:09+08:00","alt":"Routing - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Routing-V-Network-System-956.jpg?v=1685593630"}},{"id":443039777058,"handle":"secure-mobile-access","title":"Secure Mobile Access","updated_at":"2023-07-25T16:04:39+08:00","body_html":"\u003cp\u003e\u003cspan\u003eSecure your infrastructure while empowering your workforce. The Secure Mobile Access (SMA) series offers complete security for remote access to corporate resources hosted on-prem, in cloud and in hybrid datacenters.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eDeliver best-in-class secure access and minimize surface threats. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway that enables organizations to provide access to any application, anytime, from anywhere and any devices, including managed and unmanaged.\u003c\/p\u003e\n\u003cp\u003eSMA offers granular access control, context-aware device authorization, application-level VPN and complete integration with the most advanced authentications. SMA enables organizations to move to the cloud and embrace BYOD with ease.\u003c\/p\u003e","published_at":"2023-04-27T19:51:08+08:00","sort_order":"best-selling","template_suffix":"secure-mobile-access","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Secure Mobile Access"}],"published_scope":"web","image":{"created_at":"2023-07-25T16:04:38+08:00","alt":null,"width":600,"height":400,"src":"\/\/v-network.net\/cdn\/shop\/collections\/image_96e9a259-b932-433f-8d62-79400c7690ce.webp?v=1690272279"}},{"id":443039613218,"handle":"self-secure-networking","title":"Self-Secure Networking","updated_at":"2023-07-25T14:56:11+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDevoted itself to becoming a leader in implementing next generation security network, DPtech comes up with a brand new construction idea of Whitelist with management and control as the core, compared to the traditional Blacklist mechanism featuring interconnection as the core. Relying on years of deep understanding of user needs, DPtech builds a Self-Secure Network integrating Self-Secure Internet of Things, Self-Secure secure network, and Self-Secure data center by taking advantage of its products and solutions, thus making a critical change from network security to security network.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-04-27T19:50:34+08:00","sort_order":"manual","template_suffix":"self-secure-networking","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Self-Secure Networking"},{"column":"tag","relation":"equals","condition":"Self-Secure Networking"}],"published_scope":"web","image":{"created_at":"2023-07-25T14:54:43+08:00","alt":null,"width":1200,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_design-3_e6c48f8b-2cd3-4eb4-981f-e1baeef6257c.webp?v=1690268084"}},{"id":443206697250,"handle":"smbs-branches","title":"SMBs \u0026 Branches","updated_at":"2023-09-17T04:09:47+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eThe SonicWall TZ series of firewalls is designed specifically for the needs of SMBs and branch locations, delivering enterprise-class security without the enterprise-grade complexity.\u003c\/p\u003e\n\u003cp\u003eWith Zero-Touch Deployment and simplified centralized management, installation and operation is easy. Detect sophisticated threats, including encrypted attacks, with advanced networking and security features, like the multi-engine Capture Advanced Threat Protection (ATP) cloud-based sandbox service with patent-pending Real-Time Deep Memory Inspection (RTDMI™). With optional features like PoE\/PoE+ support and 802.11ac Wi-Fi, create a unified security solution for wired and wireless networks.\u003c\/p\u003e\n\u003cp\u003eSimply plug in and enjoy the advanced protection of the cost-effective SonicWall TZ series firewall without worrying about complex management — or the next threat.\u003c\/p\u003e","published_at":"2023-04-29T16:05:46+08:00","sort_order":"best-selling","template_suffix":"smbs-branches","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"SMBs \u0026 Branches"},{"column":"vendor","relation":"equals","condition":"SonicWall"}],"published_scope":"web"},{"id":436612399394,"handle":"softing","title":"Softing","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp class=\"rich-text__heading rte h1\"\u003e\u003cstrong\u003ePrevent unplanned network outages now\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eYour reliable source for testing, qualifying and certifying cabling networks based on global technological standards.\u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-02-18T08:44:42+08:00","sort_order":"best-selling","template_suffix":"softing","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Softing"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:53+08:00","alt":"Optimize! Softing - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Optimize-Softing-V-Network-System-297.png?v=1690252957"}},{"id":436612464930,"handle":"sonicwall","title":"Sonicwall","updated_at":"2023-09-25T12:22:34+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eWhether you’re a small business or a large enterprise, whether in your home or in the cloud, SonicWall next-generation firewalls (NGFW) provide the security, control and visibility you need to maintain an effective cybersecurity posture. \u003c\/span\u003e","published_at":"2023-02-18T08:45:05+08:00","sort_order":"best-selling","template_suffix":"sonicwall","disjunctive":true,"rules":[{"column":"vendor","relation":"equals","condition":"Sonicwall"},{"column":"vendor","relation":"equals","condition":"Distributor"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:27:07+08:00","alt":"Sonicwall - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Sonicwall-V-Network-System-236.png?v=1690253026"}},{"id":439408754978,"handle":"speakers-audio","title":"Speakers \u0026 Audio","updated_at":"2023-06-03T16:35:54+08:00","body_html":"","published_at":"2023-03-21T22:29:02+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Speakers \u0026 Audio"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:05+08:00","alt":"Speakers \u0026 Audio - V-Network System","width":900,"height":900,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Speakers-Audio-V-Network-System-236.webp?v=1685593925"}},{"id":439643570466,"handle":"structured-cabling-solutions","title":"Structured Cabling System","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cspan\u003eGive your network the flexible growth model it needs to enable digital connectivity, regardless of what applications and devices the future brings.\u003c\/span\u003e","published_at":"2023-03-23T16:51:16+08:00","sort_order":"best-selling","template_suffix":"structured-cabling-soluti","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Network Cabling"},{"column":"type","relation":"equals","condition":"Fibre Optic Cabling"},{"column":"type","relation":"equals","condition":"Racking \u0026 Intelligent Management"},{"column":"type","relation":"equals","condition":"Certifiers, Qualifiers and Verifiers"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:07+08:00","alt":"Structured Cabling System - V-Network System","width":946,"height":946,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Structured-Cabling-System-V-Network-System-954.webp?v=1685593927"}},{"id":439805837602,"handle":"switching","title":"Switching","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003e Increase Agility and Simplify Operations with Extreme’s Wired Access Portfolio\u003c\/p\u003e","published_at":"2023-03-25T13:04:42+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Switching"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:08+08:00","alt":"Switching - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Switching-V-Network-System-909.jpg?v=1685593929"}},{"id":437796995362,"handle":"twisted-pair-cabling","title":"Twisted Pair Cabling","updated_at":"2023-06-03T16:35:53+08:00","body_html":"","published_at":"2023-03-03T22:26:50+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Twisted Pair Cabling"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:03+08:00","alt":"Twisted Pair Cabling - V-Network System","width":350,"height":225,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Twisted-Pair-Cabling-V-Network-System-6.jpg?v=1685593923"}},{"id":444359999778,"handle":"tz","title":"TZ Series Next-Generation Firewall (NGFW)","updated_at":"2023-09-17T04:09:47+08:00","body_html":"\u003cp\u003e\u003cspan\u003eProtect your small business or branch location from intrusion, malware and ransomware with an easy-to-use, integrated security solution designed specifically for your needs. SonicWall TZ firewalls deliver enterprise-grade protection without the cost or complexity.\u003c\/span\u003e\u003c\/p\u003e\n\u003ch2 class=\"section-title\"\u003e\u003c\/h2\u003e\n\u003ch3 class=\"mb-3 section-title\"\u003e\u003c\/h3\u003e","published_at":"2023-05-12T09:51:01+08:00","sort_order":"best-selling","template_suffix":"tz-series","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"TZ Series"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:10+08:00","alt":"TZ Series Next-Generation Firewall (NGFW) - V-Network System","width":1050,"height":747,"src":"\/\/v-network.net\/cdn\/shop\/collections\/TZ-Series-Next-Generation-Firewall-NGFW-V-Network-System-618.png?v=1685593931"}},{"id":436571996450,"handle":"unified-communication-collaboration","title":"Unified Communication \u0026 Collaboration","updated_at":"2023-08-31T03:58:06+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003evnetwork's partnership with hybrid technology providers and hosted IP solutions provide us the ability to design and deploy a Unified Communication System\u003c\/span\u003e\u003cstrong data-mce-fragment=\"1\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/strong\u003e\u003cspan data-mce-fragment=\"1\"\u003ethat fits within our clients’ needs and budgets while also offering a robust variety of features such as unified communications (voicemail-to-email), instant messaging, and more.\u003c\/span\u003e\u003cbr\u003e\u003c\/p\u003e","published_at":"2023-02-17T20:34:28+08:00","sort_order":"best-selling","template_suffix":"unified-communication","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"IP Phone System"},{"column":"type","relation":"equals","condition":"Hybrid Phone System"},{"column":"type","relation":"equals","condition":"Contact Center"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:37+08:00","alt":"Unified Communication \u0026 Collaboration - V-Network System","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Unified-Communication-Collaboration-V-Network-System-734.webp?v=1685594318"}},{"id":436686029090,"handle":"ucaas","title":"Unified Communications-As-A-Service (UCaaS)","updated_at":"2023-07-25T00:10:24+08:00","body_html":"\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork provides a suite of unified communication and collaboration tools delivered over the cloud, enabling organizations to streamline their communication channels and enhance collaboration across teams and locations.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:04:22+08:00","sort_order":"best-selling","template_suffix":"ucaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Unified Communications-As-A-Service (UCaaS)"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:43+08:00","alt":"Unified Communications-As-A-Service (UCaaS) - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Unified-Communications-As-A-Service-UCaaS-V-Network-System-981.png?v=1690215024"}},{"id":436612497698,"handle":"unv","title":"UNV","updated_at":"2023-09-18T04:18:24+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eBased on advanced technologies, Uniview Smart Intrusion Prevention solutions provide highly visual system that includes detecting, alarming and recording. It’s a perfect solution to improve perimeter protection and achieve efficient management.\u003c\/p\u003e","published_at":"2023-02-18T08:45:30+08:00","sort_order":"manual","template_suffix":"uniview","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"UNV"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:39+08:00","alt":"UNV - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/UNV-V-Network-System-345.png?v=1690253043"}},{"id":445760143650,"handle":"verifiers","title":"Verifiers","updated_at":"2023-08-29T22:22:40+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eCable verification tools perform basic continuity functions such as wiremap and\/or length test. Verification tools are usually low-cost and simpler to use devices.\u003c\/span\u003e","published_at":"2023-05-23T15:40:17+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Verifiers"}],"published_scope":"web"},{"id":443051508002,"handle":"video-analytic-cloud-based-ai","title":"Video Analytic and Cloud-Base AI","updated_at":"2023-07-25T16:39:15+08:00","body_html":"\u003cp\u003eVideo Analytics uses advanced algorithms and machine learning to monitor, analyze and manage large volumes of video. They digitally analyze video inputs, transforming them into intelligent data, which helps in decision-making.\u003c\/p\u003e","published_at":"2023-04-27T22:47:25+08:00","sort_order":"best-selling","template_suffix":"video-analytic-manageme","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Video Analytic \u0026 Management"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:45+08:00","alt":"Video Analytic and Cloud-Base AI - V-Network System","width":442,"height":442,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Analytic-and-Cloud-Base-AI-V-Network-System-62.png?v=1685594326"}},{"id":439409574178,"handle":"video-conferencing","title":"Video Conferencing","updated_at":"2023-09-17T15:56:46+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eNo longer do companies have to subject their clients or employees to subpar interactions. With HD video streaming and clear, noise-reducing audio, the best video conferencing tech can transform your business operations by bringing an in-person experience to your digital meetings.\u003c\/span\u003e","published_at":"2023-03-21T22:34:13+08:00","sort_order":"best-selling","template_suffix":"video-conferencing","disjunctive":false,"rules":[{"column":"product_taxonomy_node_id","relation":"equals","condition":"1403"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:45:22+08:00","alt":"Video Conferencing - V-Network System","width":341,"height":341,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Conferencing-V-Network-System-504.jpg?v=1685594723"}},{"id":439431102754,"handle":"video-conferencing-hardware","title":"Video Conferencing Hardware","updated_at":"2023-09-17T15:56:46+08:00","body_html":"","published_at":"2023-03-22T01:27:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"product_taxonomy_node_id","relation":"equals","condition":"1403"}],"published_scope":"web"},{"id":443051442466,"handle":"video-management-storage","title":"Video Management and Storage","updated_at":"2023-09-07T18:17:07+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eVideo security helps keep locations safe through two primary methods. First, there is real-time surveillance that enables employees or law enforcement officials to discover and monitor any threat in the moment. Then there is the archival footage record that can be reviewed if a crime or other issue is uncovered or suspected at a later time. In both cases, the recorded footage needs to be securely deposited and maintained for future access — making Video Storage an essential element of every video camera security system.\u003c\/span\u003e","published_at":"2023-04-27T22:47:12+08:00","sort_order":"best-selling","template_suffix":"video-management-and-stor","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Video Storage"}],"published_scope":"web","image":{"created_at":"2023-07-25T16:35:23+08:00","alt":null,"width":1200,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_design-4_0ef28205-d19e-4fa3-8216-cd97a00e37ce.webp?v=1690274124"}},{"id":439462854946,"handle":"video-surveillance-analytic","title":"Video Surveillance \u0026 Analytic","updated_at":"2023-09-07T18:17:07+08:00","body_html":"\u003cspan\u003eFrom small deployments to large, complex infrastructures with thousands of cameras, vnetwork builds on years of experience in the industry to provide the highest-performing technology and solutions, at your budget.\u003c\/span\u003e","published_at":"2023-03-22T08:31:44+08:00","sort_order":"best-selling","template_suffix":"video-surveillance-analytic","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Video Analytic \u0026 Management"},{"column":"type","relation":"equals","condition":"Network Camera"},{"column":"type","relation":"equals","condition":"Video Storage"},{"column":"type","relation":"equals","condition":"Access Control \u0026 Integration"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:45:24+08:00","alt":"Video Surveillance \u0026 Analytic - V-Network System","width":500,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Surveillance-Analytic-V-Network-System-718.webp?v=1685594725"}},{"id":436685996322,"handle":"vsaas","title":"Video Surveillance-As-A-Service (VSaaS)","updated_at":"2023-07-25T00:11:01+08:00","body_html":"\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork delivers video surveillance and analytics solutions as a service, allowing organizations to deploy and manage their security cameras, video storage, and analytics capabilities remotely.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:03:37+08:00","sort_order":"best-selling","template_suffix":"vsaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Video Surveillance-As-A-Service"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:45:20+08:00","alt":"Video Surveillance-As-A-Service (VSaaS) - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Surveillance-As-A-Service-VSaaS-V-Network-System-999.png?v=1690215061"}},{"id":439414358306,"handle":"video-walls","title":"Video Walls","updated_at":"2023-06-03T16:35:54+08:00","body_html":"","published_at":"2023-03-21T23:24:56+08:00","sort_order":"best-selling","template_suffix":"video-walls","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Video Walls"}],"published_scope":"web"},{"id":437797093666,"handle":"vs-distribution-systems","title":"VS Distribution Systems","updated_at":"2023-06-03T16:35:53+08:00","body_html":"","published_at":"2023-03-03T22:27:34+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"VS Distribution Systems"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:53:09+08:00","alt":"VS Distribution Systems - V-Network System","width":350,"height":225,"src":"\/\/v-network.net\/cdn\/shop\/collections\/VS-Distribution-Systems-V-Network-System-689.jpg?v=1685595190"}},{"id":452941644066,"handle":"warehouse-sale","title":"Warehouse Sale","updated_at":"2023-09-27T04:12:39+08:00","body_html":"","published_at":"2023-07-28T09:32:38+08:00","sort_order":"manual","template_suffix":"","disjunctive":false,"rules":[{"column":"variant_compare_at_price","relation":"greater_than","condition":"0"}],"published_scope":"web"},{"id":445337927970,"handle":"wifi6e","title":"Wi-Fi 6E","updated_at":"2023-09-19T01:59:22+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eWi-Fi 6E is one variant of the 802.11ax standard. It uses 2.4 gigahertz, 5 GHz and, for the first time ever in the Wi-Fi realm, 6 GHz spectrum. As the latest generation of Wi-Fi, Wi-Fi 6E introduces several new features that result in faster speeds, lower latency, and higher-capacity individual cells and overall wireless local area network (WLAN) systems. And, as with earlier 802.11 variants, Wi-Fi 6E requires proper design and configuration to fully realize its benefits.\u003c\/span\u003e\u003cbr\u003e","published_at":"2023-05-19T22:20:51+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Wi-Fi 6E"}],"published_scope":"web"},{"id":436686160162,"handle":"waas","title":"WiFi-As-A-Service (WaaS)","updated_at":"2023-07-25T00:28:54+08:00","body_html":"\u003cp\u003evnetwork provides scalable and secure WiFi solutions on a subscription basis, enabling businesses to offer reliable wireless connectivity to their employees, customers, or guests.\u003c\/p\u003e","published_at":"2023-02-19T11:05:54+08:00","sort_order":"best-selling","template_suffix":"waas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"WiFi-As-A-Service (WaaS)"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:53:07+08:00","alt":"WiFi-As-A-Service (WaaS) - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/WiFi-As-A-Service-WaaS-V-Network-System-106.webp?v=1690216134"}},{"id":443039547682,"handle":"wireless","title":"Wireless","updated_at":"2023-09-06T06:14:31+08:00","body_html":"\u003cp\u003eBoost IT efficiency and deliver seamless user experiences with intelligent, cloud-driven wireless.\u003c\/p\u003e\n\u003cul role=\"list\" id=\"Slider-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7\" class=\"multicolumn-list contains-content-container grid grid--2-col-tablet-down grid--3-col-desktop slider slider--mobile grid--peek\"\u003e\n\u003cli data-cascade=\"\" class=\"multicolumn-list__item grid__item slider__slide scroll-trigger animate--slide-in\" id=\"Slide-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7-1\"\u003e\n\u003cdiv class=\"multicolumn-card content-container\"\u003e\n\u003cdiv class=\"multicolumn-card__info\"\u003e\n\u003ch3 class=\"inline-richtext\"\u003eAgile\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eThe latest enterprise-grade Wi-Fi 6E technology for both indoor and outdoor with software-selectable operating system, avoiding technology lock-in with the ability to re-deploy the same hardware for new uses cases.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/li\u003e\n\u003cli data-cascade=\"\" class=\"multicolumn-list__item grid__item slider__slide scroll-trigger animate--slide-in\" id=\"Slide-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7-2\"\u003e\n\u003cdiv class=\"multicolumn-card content-container\"\u003e\n\u003cdiv class=\"multicolumn-card__info\"\u003e\n\u003ch3 class=\"inline-richtext\"\u003eCloud Management\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eCombine the leading Wi-Fi hardware with next-generation Extreme cloud management to reduce risk and simplify operations for IT teams. Unify management of wired, wireless and SD-WAN devices via a single pane of glass. Flexible cloud-based, hybrid, or local management options to provide oversight and visibility.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/li\u003e\n\u003cli data-cascade=\"\" class=\"multicolumn-list__item grid__item slider__slide scroll-trigger animate--slide-in\" id=\"Slide-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7-3\"\u003e\n\u003cdiv class=\"multicolumn-card content-container\"\u003e\n\u003cdiv class=\"multicolumn-card__info\"\u003e\n\u003ch3 class=\"inline-richtext\"\u003eModern Digital Experience\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eLeverage Explainable Machine Learning to enable a more proactive IT Operations team. Additional built-in security, location services, and IoT security to provide all the necessary components for a modern and connected experience to unlock business value.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e","published_at":"2023-04-27T19:49:59+08:00","sort_order":"best-selling","template_suffix":"wifi-access-point-and-con","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"}],"published_scope":"web","image":{"created_at":"2023-07-25T14:14:52+08:00","alt":null,"width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/2.png?v=1690269163"}},{"id":443046035746,"handle":"xaas","title":"X-as-a-Services™ (XaaS)","updated_at":"2023-08-07T14:11:55+08:00","body_html":"Shifting from traditional Capex-based to Subscription-based offerings involves cloud- based, a hybrid approach, or on- premises equipment.","published_at":"2023-04-27T21:32:25+08:00","sort_order":"best-selling","template_suffix":"xaas","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"X-as-a-Service"},{"column":"type","relation":"equals","condition":"XaaS"}],"published_scope":"web","image":{"created_at":"2023-06-12T14:16:05+08:00","alt":null,"width":1366,"height":768,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_design-4_e32d1f8a-d730-4c5b-8e80-6186291ed125.png?v=1691388715"}},{"id":443679801634,"handle":"xprotect-extensions","title":"XProtect Extensions","updated_at":"2023-09-07T18:16:38+08:00","body_html":"\u003cp\u003e\u003cspan\u003eXProtect extensions are carefully designed software products installed on top of your XProtect VMS. Whether you operate within retail, transportation, or city surveillance, our extensions products are designed to address your industry's exact needs.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cmeta charset=\"UTF-8\"\u003eXProtect extensions are compatible with the Milestone Husky™ series. They are based on the XProtect VMS and access-control products that are installed.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-05-04T23:56:27+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"XProtect"},{"column":"tag","relation":"equals","condition":"Extensions"}],"published_scope":"web"},{"id":447235424546,"handle":"xprotect","title":"XProtect®","updated_at":"2023-09-07T18:16:35+08:00","body_html":"","published_at":"2023-06-06T19:26:18+08:00","sort_order":"created","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"XProtect"},{"column":"tag","relation":"equals","condition":"VMS"}],"published_scope":"web"},{"id":455325286690,"handle":"yottapath","title":"YottaPath","updated_at":"2023-08-18T00:25:36+08:00","body_html":"","published_at":"2023-08-18T00:25:35+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"YottaPath"}],"published_scope":"web","image":{"created_at":"2023-08-18T00:25:34+08:00","alt":null,"width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/31.png?v=1692289535"}},{"id":439809605922,"handle":"zoona-closure","title":"ZOONA Closure","updated_at":"2023-06-03T16:35:55+08:00","body_html":"For today's hybrid fibre optical access networks","published_at":"2023-03-25T14:59:35+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"ZOONA Closure"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:59:16+08:00","alt":"ZOONA Closure - V-Network System","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/ZOONA-Closure-V-Network-System-534.jpg?v=1685595557"}}]
[{"id":8254196416802,"title":"LSW2300 Series Industrial Switches","handle":"lsw2300-series-industrial-switches","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDPtech LSW2300 Series industrial switches are specially designed to meet the requirements of industrial systems such as substation automation systems, distribution network automation, and intelligent transportation. To address the actual needs of industrial applications, the DPtech industrial switches can realize real-time communication, network security, intrinsic safety and safety explosion-proof. Compared with commercial switches, industrial switches have more stringent requirements for design and selection of components, to ensure they can work properly in harsh environments.\u003cbr\u003e\u003c\/span\u003e\u003cbr\u003e\u003cspan\u003eAs most traditional industrial switches are developed in open-source operating systems based on industrial automation, it is inevitable that they have a large number of vulnerabilities and defects derived from the open-source systems, such as low reliability, poor compatibility for large and new Ethernet protocols, and failure in meeting increasingly complex industrial networking requirements. Based on in-depth understanding of the needs of various industrial scenarios, DPtech launched the next generation LSW2300 Series industrial switches in compliance with numerous standards and specifications. Based on DPtech’s ConPlat software platform, the LSW2300 Series industrial switches provide seamless integration with traditional enterprise networks by offering compatibility with rich L2-L4 network protocols, including VLAN, STP\/RSTP\/MSTP, QoS,STP\/RSTP\/MSTP, QoS, traffic control, ACL, and port mirroring. With a fanless heat dissipation circuit design, the Series provides a wide range of operating temperatures between -40 and 85ºC. Other industrial qualities include vibration resistance, shock resistance, high\/low temperature resistance, corrosion resistance, dust proof, and pulsed magnetic field immunity. Besides, the compatibility with rich network protocols for routers, switches and security helps improve its networking capability and enhance the reliability and security of industrial networks. The rich features and robust hardware design of LSW2300 Series enable its wide application in substations, distribution network intelligent transformation, factory automation, intelligent transportation, and other harsh application environments.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eIndustrial-grade hardware standards\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFollow industrial-grade design specifications, strictly control component selection, and adopt dual-power redundant design;\u003c\/p\u003e\n\u003cp\u003eSupport -40~85ºC working environment temperature. Meet EMC4 protection standards, provide impact resistance, anti-jamming, anti-shock, anti-dust, anti-corrosion and other protective capabilities to ensure stable operation in various harsh environments;\u003c\/p\u003e\n\u003cp\u003eUsing fanless design, heat conduction and heat dissipation technology;\u003c\/p\u003e\n\u003cp\u003eThe equipment can run on average for more than 35 years without failure.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible deployment capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eUsing din rail design, it can be easily stuck on the rail without fixing with screws, easy to maintain;\u003c\/p\u003e\n\u003cp\u003eSupport VLAN, STP\/RSTP, multicast, port mirroring, QoS and other layer 2 features, fully support IPv6, and provide a smooth transition capability for future network upgrades.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ePoE\/PoE+\/PoE++\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003ePower supply for PoE \/PoE+ \/ PoE ++;\u003c\/p\u003e\n\u003cp\u003eSupport PoE watchdog function, can realize automatic power off and restart.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRedundant networking mechanism\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIndependently developed FRRP fast ring network recovery protocol, which can achieve millisecond-level network failure switching;\u003c\/p\u003e\n\u003cp\u003esupport single ring, double ring, multi-ring, tangent ring, intersecting ring and other ring topologies, enabling users to design network solutions based on their systems;\u003c\/p\u003e\n\u003cp\u003esupport ring network link load sharing to improve network bandwidth utilization.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork loop monitoring technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIndependent research and development of network loop monitoring technology, once it is found that there is a loop in the network, it implements a preset alarm or blocking strategy on the loop port to perfectly solve the problem of ring network storms.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eOutstanding network performance\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith 1K multicast entries and 16K MAC entries, it can adapt to the ever-increasing requirements for network performance, and reserve sufficient space for network expansion.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security protection\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe self-developed DPtech ConPlat software eliminates all vulnerabilities and defects of open-source systems, providing high availability while ensuring safe transmission of critical data;\u003c\/p\u003e\n\u003cp\u003eSupport video security, can identify and access IPC access, monitor the working status of IPC, and improve the online rate of IPC;\u003c\/p\u003e\n\u003cp\u003eSupport centralized MAC address authentication and 802.1x authentication. Can effectively prevent illegal users from accessing the network.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eWhole machine power off alarm mechanism\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eSupports equipment failure alarm information to be sent automatically when the device is powered off, which is convenient for O\u0026amp;M personnel to determine the fault point and reduce O\u0026amp;M pressure.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork-wide clock synchronization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eSupports NTP, SNTP, IEEE 1588v2 PTP with high-precision time correction and synchronization capabilities.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRelay alarm\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eSupports alarm output of abnormal status relays such as power failure, fiber loss, network storm, etc., which facilitates quick response and maintenance and eliminates single point of failure.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Name\u003c\/th\u003e\n\u003cth\u003eLSW2300-8GT2GP-I-PWR\u003c\/th\u003e\n\u003cth\u003eLSW2300-8GT4GP-I-PWR\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension\u003c\/td\u003e\n\u003ctd\u003e95mm*130mm*175mm\u003c\/td\u003e\n\u003ctd\u003e95mm*130mm*175mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e2.0Kg\u003c\/td\u003e\n\u003ctd\u003e2.0Kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum power consumption\u003c\/td\u003e\n\u003ctd\u003e150W\u003c\/td\u003e\n\u003ctd\u003e150W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Power supply\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eAC: 90V-265V DC:24V-48V Rated current: 0.5A\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e128Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e≥15Mpps\u003c\/td\u003e\n\u003ctd\u003e≥18Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePort configuration\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interfaces + 2 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interfaces + +4 FE\/GE optical interfaces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Operating environment\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e Operating Temperature: -40~85℃ Operating Humidity: 0~95%RH (non-condensing) Mean Time between Failure (MTBF): above 35 years\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL2 Features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eWith 16K MAC address entries, it supports 802.1Q VLAN, IGMP Snooping, STP\/RSTP\/MSTP, 802.3x traffic control protocol, QoS (congestion management), 8 queues of hardware priority, rate limit based on ports, link aggregation of a maximum of 16 ports, port mirroring in ingress\/egress\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL3 Features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport static routing, RIP, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Security\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport broadcast storm suppression, multicast storm suppression and unknown unicast suppression Support 802.1X authentication, ARP attack prevention, ACL access control list\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport GMRP, IGMP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Management\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport IEEE 1588 PTP accurate time synchronization protocol, SNMP, DHCP Client, DHCP Relay Web management and command line management, enabling viewing system logs, traffic control, software version management and port management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Reliability\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport fast ring network recovery protocol (FRRP) to enable single ring, multi-ring, tangent ring, star, chain and other networks, with a ring network convergence time ≤ 20ms; support FLRP fast link recovery protocol Power supply redundancy\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Industry specifications\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e\n\u003cp\u003eBG\/T 17626 (electromagnetic compatibility) Q\/GDW 429-2010 (Technical Specification for Intelligent Substation Network Switch) GB\/T 21563-2008 (On-board Installation) IEC61850-3 EN 61000-3-2\/EN 61000-3-3 FCC Part 15,EN55022\/CISPR22,Class A\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Name\u003c\/th\u003e\n\u003cth\u003eLSW2300-8T4 GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-4G T2GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-8 GT2GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-8G T4GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-16GT 4GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-4GT4G P4S-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-8T4GP2S -I\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension\u003c\/td\u003e\n\u003ctd\u003e68mm*130m m*150mm\u003c\/td\u003e\n\u003ctd\u003e72mm*130m m*150mm\u003c\/td\u003e\n\u003ctd\u003e72mm*130 mm*150mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130m m*150mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130mm *180mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130mm*1 80mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130mm*180 mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e0.9Kg\u003c\/td\u003e\n\u003ctd\u003e1.1Kg\u003c\/td\u003e\n\u003ctd\u003e1.1Kg\u003c\/td\u003e\n\u003ctd\u003e0.9Kg\u003c\/td\u003e\n\u003ctd\u003e1.5Kg\u003c\/td\u003e\n\u003ctd\u003e1.5Kg\u003c\/td\u003e\n\u003ctd\u003e1.5Kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum power consumption\u003c\/td\u003e\n\u003ctd\u003e11W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e11W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Power supply\u003c\/td\u003e\n\u003ctd\u003eAC: 90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003eAC:90V-265 V DC:24V-48V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003e128Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e≥7.2Mpps\u003c\/td\u003e\n\u003ctd\u003e≥9Mpps\u003c\/td\u003e\n\u003ctd\u003e≥15Mpps\u003c\/td\u003e\n\u003ctd\u003e≥18Mpps\u003c\/td\u003e\n\u003ctd\u003e≥30Mpps\u003c\/td\u003e\n\u003ctd\u003e≥12Mpps\u003c\/td\u003e\n\u003ctd\u003e≥7.2Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e \u003cbr\u003ePort configuration\u003c\/td\u003e\n\u003ctd\u003e8 FE electrical interfaces +4 FE\/GE electrical interfaces\u003c\/td\u003e\n\u003ctd\u003e4 FE\/GE electrical interface + 2 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interface + 2 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interfaces +4 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e16 FE\/GE electrical interface + +4 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e4 FE\/GE electrical interfaces +4 FE\/GE optical interfaces+4 data serial ports\u003c\/td\u003e\n\u003ctd\u003e8 FE electrical interfaces +4 FE\/GE optical interfaces +2 data serial ports\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Operating environment\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003e Operating Temperature: -40~85℃ Operating Humidity: 0~95%RH (non-condensing) Mean Time between Failure (MTBF): above 35 years\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL2 Features\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eWith 16K MAC address entries, it supports 802.1Q VLAN, IGMP Snooping, STP\/RSTP\/MSTP, 802.3x traffic control protocol, QoS (Congestion Management), 8 queues of hardware priority, rate limit based on ports, link aggregation of a maximum of 16 ports, port mirroring in ingress\/egress\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL3 Features\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport static routing, RIP, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Security\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport broadcast storm suppression, multicast storm suppression and unknown unicast suppression; Support 802.1X authentication, ARP attack prevention, ACL access control list\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport GMRP, IGMP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Management\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport IEEE 1588 PTP accurate time synchronization protocol, SNMP, DHCP Client, DHCP Relay Web management and command line management, enabling viewing system logs, traffic control, software version management and port management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Reliability\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport fast ring network recovery protocol (FRRP) to enable single ring, multi-ring, tangent ring, star, chain and other networks, with a ring network convergence time ≤ 20ms; support FLRP fast link recovery protocol Power supply redundancy\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Industry specifications\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eBG\/T 17626 (electromagnetic compatibility) Q\/GDW 429-2010 (Technical Specification for Intelligent Substation Network Switch) GB\/T 21563-2008 (On-board Installation) IEC61850-3 EN 61000-3-2\/EN 61000-3-3 FCC Part 15,EN55022\/CISPR22,Class A\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cem\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1283\u0026amp;id=49\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1283\u0026amp;id=32\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0619\/20200619013428864.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPtech LSW2300 Series Industrial Switches - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-05-03T10:10:07+08:00","created_at":"2023-05-03T10:10:07+08:00","vendor":"DPtech","type":"Network Switches","tags":["Self-Secure Networking"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45074634277154,"title":"LSW2300-8GT2GP-I-PWR","option1":"LSW2300-8GT2GP-I-PWR","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-8GT2GP-I-PWR","public_title":"LSW2300-8GT2GP-I-PWR","options":["LSW2300-8GT2GP-I-PWR"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634309922,"title":"LSW2300-8GT4GP-I-PWR","option1":"LSW2300-8GT4GP-I-PWR","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-8GT4GP-I-PWR","public_title":"LSW2300-8GT4GP-I-PWR","options":["LSW2300-8GT4GP-I-PWR"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634342690,"title":"LSW2300-8T4 GP-I","option1":"LSW2300-8T4 GP-I","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-8T4 GP-I","public_title":"LSW2300-8T4 GP-I","options":["LSW2300-8T4 GP-I"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634375458,"title":"LSW2300-4G T2GP-I","option1":"LSW2300-4G T2GP-I","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-4G T2GP-I","public_title":"LSW2300-4G T2GP-I","options":["LSW2300-4G T2GP-I"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634408226,"title":"LSW2300-8 GT2GP-I","option1":"LSW2300-8 GT2GP-I","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-8 GT2GP-I","public_title":"LSW2300-8 GT2GP-I","options":["LSW2300-8 GT2GP-I"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634440994,"title":"LSW2300-8G T4GP-I","option1":"LSW2300-8G T4GP-I","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-8G T4GP-I","public_title":"LSW2300-8G T4GP-I","options":["LSW2300-8G T4GP-I"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634473762,"title":"LSW2300-16GT 4GP-I","option1":"LSW2300-16GT 4GP-I","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-16GT 4GP-I","public_title":"LSW2300-16GT 4GP-I","options":["LSW2300-16GT 4GP-I"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634506530,"title":"LSW2300-4GT4G P4S-I","option1":"LSW2300-4GT4G P4S-I","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-4GT4G P4S-I","public_title":"LSW2300-4GT4G P4S-I","options":["LSW2300-4GT4G P4S-I"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074634539298,"title":"LSW2300-8T4GP2S -I","option1":"LSW2300-8T4GP2S -I","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW2300 Series Industrial Switches - LSW2300-8T4GP2S -I","public_title":"LSW2300-8T4GP2S -I","options":["LSW2300-8T4GP2S -I"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW2300-Series-Industrial-Switches-1658.jpg?v=1695244439"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW2300-Series-Industrial-Switches-1658.jpg?v=1695244439","options":["Models"],"media":[{"alt":"DPtech LSW2300 Series Industrial Switches - vnetwork","id":34460653879586,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW2300-Series-Industrial-Switches-1658.jpg?v=1695244439"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW2300-Series-Industrial-Switches-1658.jpg?v=1695244439","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDPtech LSW2300 Series industrial switches are specially designed to meet the requirements of industrial systems such as substation automation systems, distribution network automation, and intelligent transportation. To address the actual needs of industrial applications, the DPtech industrial switches can realize real-time communication, network security, intrinsic safety and safety explosion-proof. Compared with commercial switches, industrial switches have more stringent requirements for design and selection of components, to ensure they can work properly in harsh environments.\u003cbr\u003e\u003c\/span\u003e\u003cbr\u003e\u003cspan\u003eAs most traditional industrial switches are developed in open-source operating systems based on industrial automation, it is inevitable that they have a large number of vulnerabilities and defects derived from the open-source systems, such as low reliability, poor compatibility for large and new Ethernet protocols, and failure in meeting increasingly complex industrial networking requirements. Based on in-depth understanding of the needs of various industrial scenarios, DPtech launched the next generation LSW2300 Series industrial switches in compliance with numerous standards and specifications. Based on DPtech’s ConPlat software platform, the LSW2300 Series industrial switches provide seamless integration with traditional enterprise networks by offering compatibility with rich L2-L4 network protocols, including VLAN, STP\/RSTP\/MSTP, QoS,STP\/RSTP\/MSTP, QoS, traffic control, ACL, and port mirroring. With a fanless heat dissipation circuit design, the Series provides a wide range of operating temperatures between -40 and 85ºC. Other industrial qualities include vibration resistance, shock resistance, high\/low temperature resistance, corrosion resistance, dust proof, and pulsed magnetic field immunity. Besides, the compatibility with rich network protocols for routers, switches and security helps improve its networking capability and enhance the reliability and security of industrial networks. The rich features and robust hardware design of LSW2300 Series enable its wide application in substations, distribution network intelligent transformation, factory automation, intelligent transportation, and other harsh application environments.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eIndustrial-grade hardware standards\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFollow industrial-grade design specifications, strictly control component selection, and adopt dual-power redundant design;\u003c\/p\u003e\n\u003cp\u003eSupport -40~85ºC working environment temperature. Meet EMC4 protection standards, provide impact resistance, anti-jamming, anti-shock, anti-dust, anti-corrosion and other protective capabilities to ensure stable operation in various harsh environments;\u003c\/p\u003e\n\u003cp\u003eUsing fanless design, heat conduction and heat dissipation technology;\u003c\/p\u003e\n\u003cp\u003eThe equipment can run on average for more than 35 years without failure.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible deployment capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eUsing din rail design, it can be easily stuck on the rail without fixing with screws, easy to maintain;\u003c\/p\u003e\n\u003cp\u003eSupport VLAN, STP\/RSTP, multicast, port mirroring, QoS and other layer 2 features, fully support IPv6, and provide a smooth transition capability for future network upgrades.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ePoE\/PoE+\/PoE++\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003ePower supply for PoE \/PoE+ \/ PoE ++;\u003c\/p\u003e\n\u003cp\u003eSupport PoE watchdog function, can realize automatic power off and restart.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRedundant networking mechanism\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIndependently developed FRRP fast ring network recovery protocol, which can achieve millisecond-level network failure switching;\u003c\/p\u003e\n\u003cp\u003esupport single ring, double ring, multi-ring, tangent ring, intersecting ring and other ring topologies, enabling users to design network solutions based on their systems;\u003c\/p\u003e\n\u003cp\u003esupport ring network link load sharing to improve network bandwidth utilization.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork loop monitoring technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIndependent research and development of network loop monitoring technology, once it is found that there is a loop in the network, it implements a preset alarm or blocking strategy on the loop port to perfectly solve the problem of ring network storms.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eOutstanding network performance\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith 1K multicast entries and 16K MAC entries, it can adapt to the ever-increasing requirements for network performance, and reserve sufficient space for network expansion.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security protection\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe self-developed DPtech ConPlat software eliminates all vulnerabilities and defects of open-source systems, providing high availability while ensuring safe transmission of critical data;\u003c\/p\u003e\n\u003cp\u003eSupport video security, can identify and access IPC access, monitor the working status of IPC, and improve the online rate of IPC;\u003c\/p\u003e\n\u003cp\u003eSupport centralized MAC address authentication and 802.1x authentication. Can effectively prevent illegal users from accessing the network.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eWhole machine power off alarm mechanism\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eSupports equipment failure alarm information to be sent automatically when the device is powered off, which is convenient for O\u0026amp;M personnel to determine the fault point and reduce O\u0026amp;M pressure.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork-wide clock synchronization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eSupports NTP, SNTP, IEEE 1588v2 PTP with high-precision time correction and synchronization capabilities.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRelay alarm\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eSupports alarm output of abnormal status relays such as power failure, fiber loss, network storm, etc., which facilitates quick response and maintenance and eliminates single point of failure.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Name\u003c\/th\u003e\n\u003cth\u003eLSW2300-8GT2GP-I-PWR\u003c\/th\u003e\n\u003cth\u003eLSW2300-8GT4GP-I-PWR\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension\u003c\/td\u003e\n\u003ctd\u003e95mm*130mm*175mm\u003c\/td\u003e\n\u003ctd\u003e95mm*130mm*175mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e2.0Kg\u003c\/td\u003e\n\u003ctd\u003e2.0Kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum power consumption\u003c\/td\u003e\n\u003ctd\u003e150W\u003c\/td\u003e\n\u003ctd\u003e150W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Power supply\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eAC: 90V-265V DC:24V-48V Rated current: 0.5A\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e128Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e≥15Mpps\u003c\/td\u003e\n\u003ctd\u003e≥18Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePort configuration\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interfaces + 2 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interfaces + +4 FE\/GE optical interfaces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Operating environment\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e Operating Temperature: -40~85℃ Operating Humidity: 0~95%RH (non-condensing) Mean Time between Failure (MTBF): above 35 years\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL2 Features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eWith 16K MAC address entries, it supports 802.1Q VLAN, IGMP Snooping, STP\/RSTP\/MSTP, 802.3x traffic control protocol, QoS (congestion management), 8 queues of hardware priority, rate limit based on ports, link aggregation of a maximum of 16 ports, port mirroring in ingress\/egress\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL3 Features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport static routing, RIP, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Security\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport broadcast storm suppression, multicast storm suppression and unknown unicast suppression Support 802.1X authentication, ARP attack prevention, ACL access control list\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport GMRP, IGMP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Management\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport IEEE 1588 PTP accurate time synchronization protocol, SNMP, DHCP Client, DHCP Relay Web management and command line management, enabling viewing system logs, traffic control, software version management and port management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Reliability\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport fast ring network recovery protocol (FRRP) to enable single ring, multi-ring, tangent ring, star, chain and other networks, with a ring network convergence time ≤ 20ms; support FLRP fast link recovery protocol Power supply redundancy\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Industry specifications\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e\n\u003cp\u003eBG\/T 17626 (electromagnetic compatibility) Q\/GDW 429-2010 (Technical Specification for Intelligent Substation Network Switch) GB\/T 21563-2008 (On-board Installation) IEC61850-3 EN 61000-3-2\/EN 61000-3-3 FCC Part 15,EN55022\/CISPR22,Class A\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Name\u003c\/th\u003e\n\u003cth\u003eLSW2300-8T4 GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-4G T2GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-8 GT2GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-8G T4GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-16GT 4GP-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-4GT4G P4S-I\u003c\/th\u003e\n\u003cth\u003eLSW2300-8T4GP2S -I\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension\u003c\/td\u003e\n\u003ctd\u003e68mm*130m m*150mm\u003c\/td\u003e\n\u003ctd\u003e72mm*130m m*150mm\u003c\/td\u003e\n\u003ctd\u003e72mm*130 mm*150mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130m m*150mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130mm *180mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130mm*1 80mm\u003c\/td\u003e\n\u003ctd\u003e68mm*130mm*180 mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e0.9Kg\u003c\/td\u003e\n\u003ctd\u003e1.1Kg\u003c\/td\u003e\n\u003ctd\u003e1.1Kg\u003c\/td\u003e\n\u003ctd\u003e0.9Kg\u003c\/td\u003e\n\u003ctd\u003e1.5Kg\u003c\/td\u003e\n\u003ctd\u003e1.5Kg\u003c\/td\u003e\n\u003ctd\u003e1.5Kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum power consumption\u003c\/td\u003e\n\u003ctd\u003e11W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e15W\u003c\/td\u003e\n\u003ctd\u003e11W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Power supply\u003c\/td\u003e\n\u003ctd\u003eAC: 90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003eAC:90V-265 V DC:24V-48V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003ctd\u003e AC:90V-265V DC:24V-48V LDC:12V-24V Rated current: 0.5A\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003e128Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e≥7.2Mpps\u003c\/td\u003e\n\u003ctd\u003e≥9Mpps\u003c\/td\u003e\n\u003ctd\u003e≥15Mpps\u003c\/td\u003e\n\u003ctd\u003e≥18Mpps\u003c\/td\u003e\n\u003ctd\u003e≥30Mpps\u003c\/td\u003e\n\u003ctd\u003e≥12Mpps\u003c\/td\u003e\n\u003ctd\u003e≥7.2Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e \u003cbr\u003ePort configuration\u003c\/td\u003e\n\u003ctd\u003e8 FE electrical interfaces +4 FE\/GE electrical interfaces\u003c\/td\u003e\n\u003ctd\u003e4 FE\/GE electrical interface + 2 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interface + 2 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e8 FE\/GE electrical interfaces +4 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e16 FE\/GE electrical interface + +4 FE\/GE optical interfaces\u003c\/td\u003e\n\u003ctd\u003e4 FE\/GE electrical interfaces +4 FE\/GE optical interfaces+4 data serial ports\u003c\/td\u003e\n\u003ctd\u003e8 FE electrical interfaces +4 FE\/GE optical interfaces +2 data serial ports\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Operating environment\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003e Operating Temperature: -40~85℃ Operating Humidity: 0~95%RH (non-condensing) Mean Time between Failure (MTBF): above 35 years\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL2 Features\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eWith 16K MAC address entries, it supports 802.1Q VLAN, IGMP Snooping, STP\/RSTP\/MSTP, 802.3x traffic control protocol, QoS (Congestion Management), 8 queues of hardware priority, rate limit based on ports, link aggregation of a maximum of 16 ports, port mirroring in ingress\/egress\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eL3 Features\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport static routing, RIP, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Security\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport broadcast storm suppression, multicast storm suppression and unknown unicast suppression; Support 802.1X authentication, ARP attack prevention, ACL access control list\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport GMRP, IGMP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Management\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport IEEE 1588 PTP accurate time synchronization protocol, SNMP, DHCP Client, DHCP Relay Web management and command line management, enabling viewing system logs, traffic control, software version management and port management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Reliability\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport fast ring network recovery protocol (FRRP) to enable single ring, multi-ring, tangent ring, star, chain and other networks, with a ring network convergence time ≤ 20ms; support FLRP fast link recovery protocol Power supply redundancy\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Industry specifications\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eBG\/T 17626 (electromagnetic compatibility) Q\/GDW 429-2010 (Technical Specification for Intelligent Substation Network Switch) GB\/T 21563-2008 (On-board Installation) IEC61850-3 EN 61000-3-2\/EN 61000-3-3 FCC Part 15,EN55022\/CISPR22,Class A\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cem\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1283\u0026amp;id=49\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1283\u0026amp;id=32\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0619\/20200619013428864.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPtech LSW2300 Series Industrial Switches - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8254192353570,"title":"LSW3600-SE Self-Secure Switch","handle":"lsw3600-se-self-secure-switch","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eWith the rapid development of network informatization, information systems have become an indispensable infrastructure in people's daily lives. However, in the traditional network construction concept, the impact of abnormal intranet terminals and abnormal behavior on network efficiency is often neglected. Once an intranet security incident cannot be located and handled accurately, it is extremely difficult to retrospect afterwards. In response to the current situation of intranet security, DPtech has created the next-generation security switch by giving the network edge intelligent computing capabilities, so that the network equipment itself has immunity to virus propagation, network attacks, and hacker penetration. It also provides the functions of automatic policy deployment and loop self-check and self-healing, and provides network administrators with a visualization of the entire network security and simple desktop management methods for operation and maintenance.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eClientless authentication and non-sensing roaming\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eDPtech Self-Secure secure network Solution supports clientless authentication for internal terminals. After the successful authentication for the first time, the device can log to the intranet later with transparent authentication. The authentication information can be roamed throughout the network to realize easy access.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eTraffic control model combining blacklist and whitelist\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution provides intranet traffic shaping and control. A whitelist model is deployed for intranet lateral traffic, blocking all traffic and allowing only service traffic such as access to printer and sharing resource groups to pass through. In this way, it helps effectively control virus spreading in intranet. A blacklist model is deployed for intranet vertical traffic in order to manage and control DDoS and other attacks through defenses against behavior, service and threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eProgressive security policies deployed as needed\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution allows policy deployments of vertical traffic control at three levels: behavior, service and threat. Behavior policy is deployed to monitor all access users. Once illegal actions by a user are found, the Self-Secure switch will freeze the user. When the user passes authentication, the service policy will be linked to user identity, location, status and other information, making sure access to certain services is limited to users with certain permissions to avoid unauthorized access. In the meantime, special policies can be deployed to address deep threat and advanced attacks, realizing intensified protection for the intranet.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork-wide policy interaction to prevent any potential threat\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough interactions of DPtech Self-Secure switch, Self-Secure controller and Self-Secure management platform, network-wide policies can be dynamically distributed, and the access layer automatically can implement policies from the management platform to prevent any potential threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eIntranet user awareness and network-wide traceability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution is capable of intelligently detecting users and monitoring their online behaviors. It performs auditing and generates logs automatically of any abnormal behavior and access, helping administrators gain an overall understanding of intranet user behaviors.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSmooth evolution of the existing network\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure controller can be deployed online or side-by-side, realizing zero-modification expansion in the original network, and allowing clientless authentication and policy follow-up of users and devices within the network. DPtech Self-Secure Switch enables awareness of user behaviors, access location and other information. Through interactions with security policies, seamless security is thus made possible. The deployment of professional Network Security devices will facilitate the upgrade and transformation of network security construction by providing strong defense against deep threats and advanced attacks, and help users to smoothly evolve their networks and build a Self-Secure network that is safe, easy to manage, and visualized.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Controller\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eiNAC-Blade-A\/AI\/17A\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHighly reliable design\u003c\/td\u003e\n\u003ctd\u003eSupport key hardware redundancy of master control, power supplies and fans\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd\u003eSupport VSM virtualization and cloud boards\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess authentication\u003c\/td\u003e\n\u003ctd\u003eSupport Portal, IP, MAC, PPPOE, WeChat, SMS and other authentication modes\u003cbr\u003eSupport transparent authentication and authentication roaming\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess management\u003c\/td\u003e\n\u003ctd\u003eSupport permission management based on IP, user and user group\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTraffic control\u003c\/td\u003e\n\u003ctd\u003eSupport whitelisting for lateral traffic and blacklisting for vertical traffic\u003cbr\u003eSupport granular traffic control and traffic model analysis and learning\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAuditing of abnormal traffic\u003c\/td\u003e\n\u003ctd\u003eSupport alert and blocks based on unified auditing of traffic model and behavior models\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser traceability\u003c\/td\u003e\n\u003ctd\u003eNetwork-wide identity follow-up; support detection of access terminal, precise positioning of user location, and network-wide traceability of user behaviors\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAutomatic deployment\u003c\/td\u003e\n\u003ctd\u003eSupport Openflow1.3 protocol and network-wide automatic deployment\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Switch\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth class=\"td1\"\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e24GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e48GT4XGS-SE\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e222Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport static routing, RIPv1\/v2, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser awareness\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport precise identification of the type of access terminals and access locations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDevice protection\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eProtection against\u003cbr\u003eintranet attacks\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFan\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eFanless\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e2 pieces\u003c\/td\u003e\n\u003ctd\u003eFanless\u003c\/td\u003e\n\u003ctd\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePoE external power\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower\u003c\/td\u003e\n\u003ctd\u003e22W\u003c\/td\u003e\n\u003ctd\u003e34W\u003c\/td\u003e\n\u003ctd\u003e20W\u003c\/td\u003e\n\u003ctd\u003e30W\u003c\/td\u003e\n\u003ctd\u003e20.6W\u003c\/td\u003e\n\u003ctd\u003e39W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating Temperature\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e0°C~70°C\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e-10℃~55℃\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport real-time temperature detection and alarm;\u003cbr\u003eSupport SNMP, CLI, Web network management and unified management through Self-Secure management platform;\u003cbr\u003eSupport local and remote output of system logs, operation logs, debugging information;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cem\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/em\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0617\/20200617043016406.pdf\" target=\"_blank\"\u003eDPtech Self-Secure Switch Series - DATA SHEET\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-05-03T10:06:14+08:00","created_at":"2023-05-03T10:06:14+08:00","vendor":"DPtech","type":"Network Switches","tags":["Self-Secure Networking"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45074557403426,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW3600-SE Self-Secure Switch","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438","options":["Title"],"media":[{"alt":"DPtech LSW3600-SE Self-Secure Switch - vnetwork","id":34460653748514,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eWith the rapid development of network informatization, information systems have become an indispensable infrastructure in people's daily lives. However, in the traditional network construction concept, the impact of abnormal intranet terminals and abnormal behavior on network efficiency is often neglected. Once an intranet security incident cannot be located and handled accurately, it is extremely difficult to retrospect afterwards. In response to the current situation of intranet security, DPtech has created the next-generation security switch by giving the network edge intelligent computing capabilities, so that the network equipment itself has immunity to virus propagation, network attacks, and hacker penetration. It also provides the functions of automatic policy deployment and loop self-check and self-healing, and provides network administrators with a visualization of the entire network security and simple desktop management methods for operation and maintenance.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eClientless authentication and non-sensing roaming\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eDPtech Self-Secure secure network Solution supports clientless authentication for internal terminals. After the successful authentication for the first time, the device can log to the intranet later with transparent authentication. The authentication information can be roamed throughout the network to realize easy access.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eTraffic control model combining blacklist and whitelist\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution provides intranet traffic shaping and control. A whitelist model is deployed for intranet lateral traffic, blocking all traffic and allowing only service traffic such as access to printer and sharing resource groups to pass through. In this way, it helps effectively control virus spreading in intranet. A blacklist model is deployed for intranet vertical traffic in order to manage and control DDoS and other attacks through defenses against behavior, service and threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eProgressive security policies deployed as needed\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution allows policy deployments of vertical traffic control at three levels: behavior, service and threat. Behavior policy is deployed to monitor all access users. Once illegal actions by a user are found, the Self-Secure switch will freeze the user. When the user passes authentication, the service policy will be linked to user identity, location, status and other information, making sure access to certain services is limited to users with certain permissions to avoid unauthorized access. In the meantime, special policies can be deployed to address deep threat and advanced attacks, realizing intensified protection for the intranet.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork-wide policy interaction to prevent any potential threat\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough interactions of DPtech Self-Secure switch, Self-Secure controller and Self-Secure management platform, network-wide policies can be dynamically distributed, and the access layer automatically can implement policies from the management platform to prevent any potential threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eIntranet user awareness and network-wide traceability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution is capable of intelligently detecting users and monitoring their online behaviors. It performs auditing and generates logs automatically of any abnormal behavior and access, helping administrators gain an overall understanding of intranet user behaviors.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSmooth evolution of the existing network\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure controller can be deployed online or side-by-side, realizing zero-modification expansion in the original network, and allowing clientless authentication and policy follow-up of users and devices within the network. DPtech Self-Secure Switch enables awareness of user behaviors, access location and other information. Through interactions with security policies, seamless security is thus made possible. The deployment of professional Network Security devices will facilitate the upgrade and transformation of network security construction by providing strong defense against deep threats and advanced attacks, and help users to smoothly evolve their networks and build a Self-Secure network that is safe, easy to manage, and visualized.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Controller\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eiNAC-Blade-A\/AI\/17A\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHighly reliable design\u003c\/td\u003e\n\u003ctd\u003eSupport key hardware redundancy of master control, power supplies and fans\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd\u003eSupport VSM virtualization and cloud boards\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess authentication\u003c\/td\u003e\n\u003ctd\u003eSupport Portal, IP, MAC, PPPOE, WeChat, SMS and other authentication modes\u003cbr\u003eSupport transparent authentication and authentication roaming\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess management\u003c\/td\u003e\n\u003ctd\u003eSupport permission management based on IP, user and user group\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTraffic control\u003c\/td\u003e\n\u003ctd\u003eSupport whitelisting for lateral traffic and blacklisting for vertical traffic\u003cbr\u003eSupport granular traffic control and traffic model analysis and learning\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAuditing of abnormal traffic\u003c\/td\u003e\n\u003ctd\u003eSupport alert and blocks based on unified auditing of traffic model and behavior models\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser traceability\u003c\/td\u003e\n\u003ctd\u003eNetwork-wide identity follow-up; support detection of access terminal, precise positioning of user location, and network-wide traceability of user behaviors\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAutomatic deployment\u003c\/td\u003e\n\u003ctd\u003eSupport Openflow1.3 protocol and network-wide automatic deployment\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Switch\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth class=\"td1\"\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e24GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e48GT4XGS-SE\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e222Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport static routing, RIPv1\/v2, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser awareness\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport precise identification of the type of access terminals and access locations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDevice protection\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eProtection against\u003cbr\u003eintranet attacks\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFan\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eFanless\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e2 pieces\u003c\/td\u003e\n\u003ctd\u003eFanless\u003c\/td\u003e\n\u003ctd\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePoE external power\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower\u003c\/td\u003e\n\u003ctd\u003e22W\u003c\/td\u003e\n\u003ctd\u003e34W\u003c\/td\u003e\n\u003ctd\u003e20W\u003c\/td\u003e\n\u003ctd\u003e30W\u003c\/td\u003e\n\u003ctd\u003e20.6W\u003c\/td\u003e\n\u003ctd\u003e39W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating Temperature\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e0°C~70°C\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e-10℃~55℃\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport real-time temperature detection and alarm;\u003cbr\u003eSupport SNMP, CLI, Web network management and unified management through Self-Secure management platform;\u003cbr\u003eSupport local and remote output of system logs, operation logs, debugging information;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cem\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/em\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0617\/20200617043016406.pdf\" target=\"_blank\"\u003eDPtech Self-Secure Switch Series - DATA SHEET\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8252821700898,"title":"Unified Audit Gateway","handle":"unified-audit-gateway","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eA large amount of application traffic transmitted on the network will lead to congestion at the network egress, and potential hazards such as failure to monitor the working status, leakage of sensitive information, even legal violations. The UAG3000, or Unified Audit Gateway (UAG), an independently developed product from DPtech is designed to provides users with professional application control, bandwidth management, Internet behavior auditing, keyword filtering, and user behavior analysis. It helps users make rational utilization of network bandwidth, ensure data security, improve working efficiency, and avoid legal risks, enabling a visible, controllable and optimizable network for users.\u003c\/span\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES \u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eMassive features to ensure precise control\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIdentifying more than 5,200 network layer and application layer protocols, it allows customized network applications based on features and enables precise Internet behavior management and traffic control in IPv4\/IPv6 environments.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible authentication and real-name auditing\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eAuthentication methods include third-party authentication such as user\/MAC\/IP, Portal local, Radius, and LDAP, SMS authentication, WeChat authentication, and transparent authentication. By integrating with mainstream systems like Srun Software and Dr.COM, it acquires correspondence relationship between users and IP addresses, enabling user-specific unified auditing, satisfying the requirements for security compliance in accordance with Provisions on Technical Measures for Internet Security Protection (Order No. 82 of the Ministry of Public Security), the Regulations on Internet Security Supervision and Inspection by Public Security Organs (Order No. 151 of the Ministry of Public Security), and the Regulations on network security Multi-level Protection Scheme.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVisible networking quality\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eUser’s bandwidth utilization can be presented through multiple metrics, such as user, application, traffic, and time. Besides, networking quality is analyzed to monitor network delay, status code, retransmission rate and other parameters, providing an overall understanding of user, application and Web access.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eLink Load Balancing\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFeaturing network segment table of mainstream domestic carriers, it can hold sessions and perform health check. Available scheduling algorithms include polling, minimum bandwidth utilization, source-destination address hashing, minimum connection, etc, thereby enabling carrier traffic scheduling, overload traffic scheduling, customized traffic scheduling based on four-layer ports, and other scheduling policies. Moreover, it can be used as a link optimization gateway and support gateway mode, NAT, routing and forwarding.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ePerfect local logs\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eLocal hard disk storage is enabled, which help make the best of users’ IT infrastructure investment without the need of installing a data storage server. It provides analysis reports on traffic trends from the perspectives of interfaces, users, applications and time, allowing users to investigate into users or applications with a large bandwidth consumption on the network. It can make statistics of users’ behavior by calculating their time spent on non-work related applications, such as games, videos, and shopping. It keeps a record of users’ online behaviors, including detailed information on Web access, email transmission, instant messaging, and forum access.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Functions\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eFunction Descriptions\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNetworking modes\u003c\/td\u003e\n\u003ctd\u003eTransparent mode, bridge mode, bypass mode, gateway mode\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNetwork Features\u003c\/td\u003e\n\u003ctd\u003eIt supports routing protocols such as IPv4\/v6, RIP, OSPF, ISIS, BGP, static routing and policy-go-together.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService identification\u003c\/td\u003e\n\u003ctd\u003eSupporting more than 5,200 mainstream network layer and application layer protocols, it enables precise Internet behavior management and traffic control.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eCustom applications\u003c\/td\u003e\n\u003ctd\u003eIt supports custom web applications based on deep detection (with application features).\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eApplication control\u003c\/td\u003e\n\u003ctd\u003eIt allows to limit the access speed of or block access to P2P, IPTV, games, instant messaging and other applications.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulti-dimensional authorization\u003c\/td\u003e\n\u003ctd\u003eInternet access can be granted based on user\/user group, IP\/IP group, time periods, and application protocols.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eURL filtering\u003c\/td\u003e\n\u003ctd\u003eEquipped with a URL address library consisting of ten million entries, it supports URL classification filtering, URL advanced filtering and URL redirection.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eKeyword filtering\u003c\/td\u003e\n\u003ctd\u003eKeyword filtering is realized on emails, forums, web page searches, web browsing and HTTP POST.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBehavior Auditing\u003c\/td\u003e\n\u003ctd\u003eIt can perform content auditing on Web applications, Web searches, emails, forums, instant messaging, and FTP.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess authentication\u003c\/td\u003e\n\u003ctd\u003eA series of authentication methods can be enabled based on IP\/MAC binding, Portal, SMS, WeChat and so on .Integrating with authentication methods of local, Radius, LDAP, PPPoe, and domain monitoring, and mainstream systems like Shenlan Software and Dr.COM, it gathers information on user\/IP correspondence.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBandwidth management\u003c\/td\u003e\n\u003ctd\u003eBandwidth limits and guarantees\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNAT\u003c\/td\u003e\n\u003ctd\u003eSupport source NAT, destination NAT, one-to-one NAT, NAT address pool and other NAT functions.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNetwork quality analysis\u003c\/td\u003e\n\u003ctd\u003eMonitor network delay, status code, retransmission rate and other parameters, providing an overall understanding of user, application and Web access\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Load Balancing\u003c\/td\u003e\n\u003ctd\u003eAvailable scheduling algorithms include polling, minimum bandwidth utilization, source-destination address hashing, minimum connection, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAntivirus protection\u003c\/td\u003e\n\u003ctd\u003eThree levels of Antivirus protection are enabled, through which users can configure different levels of Antivirus protection based on the popularity of viruses.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHigh Reliability\u003c\/td\u003e\n\u003ctd\u003eSilent dual system, dual-system hot standby, VRRP multi-master and other modes are supported.Power fail safeguard is enabled for embedded electrical interfaces.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDifferent permissionsbased on division andclassification\u003c\/td\u003e\n\u003ctd\u003eUsers are assigned with different management permissions based on customized division and classification, thereby classifying user groups and application protocols per permissions.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1342\u0026amp;id=6\"\u003e\u003cem\u003e\u003cspan\u003eDPtech UAG3000 Unified Audit Gateway (UAG) Technical White Paper\u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1342\u0026amp;id=19\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM\u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0610\/20200610093615939.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Unified Audit Gateway\u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-05-02T12:34:17+08:00","created_at":"2023-05-02T12:34:17+08:00","vendor":"DPtech","type":"Network Management","tags":[],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45069078004002,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Unified Audit Gateway","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Audit-Gateway-5831.jpg?v=1695244434"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Audit-Gateway-5831.jpg?v=1695244434","options":["Title"],"media":[{"alt":"DPtech Unified Audit Gateway - vnetwork","id":34461746331938,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Audit-Gateway-5831.jpg?v=1695244434"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Audit-Gateway-5831.jpg?v=1695244434","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eA large amount of application traffic transmitted on the network will lead to congestion at the network egress, and potential hazards such as failure to monitor the working status, leakage of sensitive information, even legal violations. The UAG3000, or Unified Audit Gateway (UAG), an independently developed product from DPtech is designed to provides users with professional application control, bandwidth management, Internet behavior auditing, keyword filtering, and user behavior analysis. It helps users make rational utilization of network bandwidth, ensure data security, improve working efficiency, and avoid legal risks, enabling a visible, controllable and optimizable network for users.\u003c\/span\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES \u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eMassive features to ensure precise control\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIdentifying more than 5,200 network layer and application layer protocols, it allows customized network applications based on features and enables precise Internet behavior management and traffic control in IPv4\/IPv6 environments.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible authentication and real-name auditing\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eAuthentication methods include third-party authentication such as user\/MAC\/IP, Portal local, Radius, and LDAP, SMS authentication, WeChat authentication, and transparent authentication. By integrating with mainstream systems like Srun Software and Dr.COM, it acquires correspondence relationship between users and IP addresses, enabling user-specific unified auditing, satisfying the requirements for security compliance in accordance with Provisions on Technical Measures for Internet Security Protection (Order No. 82 of the Ministry of Public Security), the Regulations on Internet Security Supervision and Inspection by Public Security Organs (Order No. 151 of the Ministry of Public Security), and the Regulations on network security Multi-level Protection Scheme.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVisible networking quality\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eUser’s bandwidth utilization can be presented through multiple metrics, such as user, application, traffic, and time. Besides, networking quality is analyzed to monitor network delay, status code, retransmission rate and other parameters, providing an overall understanding of user, application and Web access.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eLink Load Balancing\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFeaturing network segment table of mainstream domestic carriers, it can hold sessions and perform health check. Available scheduling algorithms include polling, minimum bandwidth utilization, source-destination address hashing, minimum connection, etc, thereby enabling carrier traffic scheduling, overload traffic scheduling, customized traffic scheduling based on four-layer ports, and other scheduling policies. Moreover, it can be used as a link optimization gateway and support gateway mode, NAT, routing and forwarding.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ePerfect local logs\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eLocal hard disk storage is enabled, which help make the best of users’ IT infrastructure investment without the need of installing a data storage server. It provides analysis reports on traffic trends from the perspectives of interfaces, users, applications and time, allowing users to investigate into users or applications with a large bandwidth consumption on the network. It can make statistics of users’ behavior by calculating their time spent on non-work related applications, such as games, videos, and shopping. It keeps a record of users’ online behaviors, including detailed information on Web access, email transmission, instant messaging, and forum access.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Functions\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eFunction Descriptions\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNetworking modes\u003c\/td\u003e\n\u003ctd\u003eTransparent mode, bridge mode, bypass mode, gateway mode\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNetwork Features\u003c\/td\u003e\n\u003ctd\u003eIt supports routing protocols such as IPv4\/v6, RIP, OSPF, ISIS, BGP, static routing and policy-go-together.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService identification\u003c\/td\u003e\n\u003ctd\u003eSupporting more than 5,200 mainstream network layer and application layer protocols, it enables precise Internet behavior management and traffic control.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eCustom applications\u003c\/td\u003e\n\u003ctd\u003eIt supports custom web applications based on deep detection (with application features).\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eApplication control\u003c\/td\u003e\n\u003ctd\u003eIt allows to limit the access speed of or block access to P2P, IPTV, games, instant messaging and other applications.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulti-dimensional authorization\u003c\/td\u003e\n\u003ctd\u003eInternet access can be granted based on user\/user group, IP\/IP group, time periods, and application protocols.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eURL filtering\u003c\/td\u003e\n\u003ctd\u003eEquipped with a URL address library consisting of ten million entries, it supports URL classification filtering, URL advanced filtering and URL redirection.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eKeyword filtering\u003c\/td\u003e\n\u003ctd\u003eKeyword filtering is realized on emails, forums, web page searches, web browsing and HTTP POST.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBehavior Auditing\u003c\/td\u003e\n\u003ctd\u003eIt can perform content auditing on Web applications, Web searches, emails, forums, instant messaging, and FTP.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess authentication\u003c\/td\u003e\n\u003ctd\u003eA series of authentication methods can be enabled based on IP\/MAC binding, Portal, SMS, WeChat and so on .Integrating with authentication methods of local, Radius, LDAP, PPPoe, and domain monitoring, and mainstream systems like Shenlan Software and Dr.COM, it gathers information on user\/IP correspondence.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBandwidth management\u003c\/td\u003e\n\u003ctd\u003eBandwidth limits and guarantees\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNAT\u003c\/td\u003e\n\u003ctd\u003eSupport source NAT, destination NAT, one-to-one NAT, NAT address pool and other NAT functions.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNetwork quality analysis\u003c\/td\u003e\n\u003ctd\u003eMonitor network delay, status code, retransmission rate and other parameters, providing an overall understanding of user, application and Web access\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Load Balancing\u003c\/td\u003e\n\u003ctd\u003eAvailable scheduling algorithms include polling, minimum bandwidth utilization, source-destination address hashing, minimum connection, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAntivirus protection\u003c\/td\u003e\n\u003ctd\u003eThree levels of Antivirus protection are enabled, through which users can configure different levels of Antivirus protection based on the popularity of viruses.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHigh Reliability\u003c\/td\u003e\n\u003ctd\u003eSilent dual system, dual-system hot standby, VRRP multi-master and other modes are supported.Power fail safeguard is enabled for embedded electrical interfaces.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDifferent permissionsbased on division andclassification\u003c\/td\u003e\n\u003ctd\u003eUsers are assigned with different management permissions based on customized division and classification, thereby classifying user groups and application protocols per permissions.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1342\u0026amp;id=6\"\u003e\u003cem\u003e\u003cspan\u003eDPtech UAG3000 Unified Audit Gateway (UAG) Technical White Paper\u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1342\u0026amp;id=19\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM\u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0610\/20200610093615939.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Unified Audit Gateway\u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8252817932578,"title":"Application Delivery Platform","handle":"application-delivery-platform","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eBridging the gap between networks and applications, DPtech ADX addresses the increasing number of users and their growingly higher requirements for application. Users are provided with fast and safe access, and uninterrupted stability around the clock. In addition, it helps bring down operation costs while delivering high performance. As the industry’s first 3.2T application delivery platform, ADX features strong processing abilities, comprehensive application delivery capabilities, and abundant interfaces, thus is applicable to data centers and network egress for various industries and operators. It also provides outstanding service values such as improving the reliability and responsiveness of services and contributing to flexible business expansion.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible Deployment\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIt can be deployed in serial\/one by one, bypass and sandwich modes. With high-density Gigabit and 10-Gigabit interfaces, it can meet various needs of complex application environments.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Detection and Intelligent Scheduling\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eMore than 30 health-check algorithms, 20 plus scheduling algorithms and business-based customized models are available. Detection can be performed at the network layer and the application layer. Operation status of servers and links can be inspected. All these measures facilitates a quick selection of the most suitable server and outbound links and ensures highly efficient load sharing.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich Network Features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCompatible with IPv4\/IPv6, OSPF, RIP, MPLS and other protocols, it is capable of catering to networking requirements of complex network environments.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVersatile fusion\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIntegrating links, servers and global load balancing, it is provided with SSL offload\u0026amp;acceleration, HTTP compression, HTTP compression, anti-DDoS and other application optimization and security protection functions to guarantee fast, safe and readily available applications.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ePersonalized programming\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eAD-Rules is apt at meeting personalized needs of users in scenarios of network egress, server, and data center. It is widely used in such industries as operator, power, and finance.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eThe First 3.2T Application Delivery Platform\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on high-performance hardware architecture APP-X, the maximum performance of a single device can reach 3.2 Tbps, and performance aggregation and multiplication is available through N:M virtualization.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBy applying technologies such as redundant design of key components, separation of data plane from the control plane, and N:M virtualization, it is effective in reducing single points of failure and ensuring 99.999% carrier-grade reliability.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFunction Descriptions\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eComprehensive Functions\u003c\/td\u003e\n\u003ctd\u003eA fusion of link load balancing, server load balancing, global load balancing, SSL offload\u0026amp;acceleration, HTTP compression, Cache and other application delivery technologies.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eApplication Virtualization\u003c\/td\u003e\n\u003ctd\u003eThe N:M virtualization technology can realize virtualization by integrating multiple devices into a resource pool, which is then divided into M logical devices as needed to achieve dynamic scheduling of resource pools in a cloud computing environment.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOutstanding Performance\u003c\/td\u003e\n\u003ctd\u003eMaximum performance of a single device can reach 400 G\u003cstrong\u003e*\u003c\/strong\u003e, and performance aggregation and multiplication is available through N:M virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eExcellent Reliability\u003c\/td\u003e\n\u003ctd\u003eN:M virtualization, silent dual system, dual-system hot standby, VRRP multi-master and other modes are supported to meet reliability needs of various levels.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePersonalized programming\u003c\/td\u003e\n\u003ctd\u003eAD-Rules is apt at meeting personalized needs of users.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eRich Network Features\u003c\/td\u003e\n\u003ctd\u003eIt supports routing protocols such as IPv4\/v6, NAT, MPLS, OSPF, RIP, and dynamic\/static routing.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eConsiderate Design\u003c\/td\u003e\n\u003ctd\u003eLogin and logout of the dynamically expandable server will have no impact on the existing network.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFloating Long Connection\u003c\/td\u003e\n\u003ctd\u003eApplication services with a long connection time can be disconnected actively and reload a new connection according to the predetermined polices.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFour Layers of Load Balancing\u003c\/td\u003e\n\u003ctd\u003eRich 4-layer load balancing algorithms are provided, including polling, weighted polling, minimum connection, weighted minimum connection, source address hash, Source address hash, destination address hash, minimum expected delay, minimum queue, random, weighted random, and minimum server load.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSeven Layers of Load Balancing\u003c\/td\u003e\n\u003ctd\u003eRich 7-layer load balancing algorithms are provided, including minimum server load, http header, http content, polling, weighted polling, minimum connection, weighted minimum connection, source address hash, Source address hash, destination address hash, minimum expected delay, minimum queue, random, and weighted random.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSSL offload\u0026amp;acceleration\u003c\/td\u003e\n\u003ctd\u003eFeaturing SSL proxy, termination, and unload technologies, and supporting SSL hardware acceleration and session persistence, it greatly reduces pressure on servers and shortens user’s access time to resources.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSource Address Traceability\u003c\/td\u003e\n\u003ctd\u003eWith x-fordward-for, it can identify the HTTP request header field of the original IP address of the client connected to the Web server through HTTP proxy or load balancing, making access source traceable.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eConnection Multiplexing\u003c\/td\u003e\n\u003ctd\u003eMultiple connections can be multiplexed into a single connection, and a connection can also be split into multiple connections.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHTTP Compression\u003c\/td\u003e\n\u003ctd\u003eHTTP cache and compression help significantly reduce server pressure, shorten time spent in downloading resources and improve efficiency.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003esession persistence\u003c\/td\u003e\n\u003ctd\u003eProvide a variety of session persistence policies, including source IP, http cookie (multiple cookie modes), http header, http content, SIP, SSL id, RTP\/RTCP\/RTSP, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHealth Detection Algorithm\u003c\/td\u003e\n\u003ctd\u003eARP, ICMP, TCP, HTTP, DNS, service-based and content-based algorithms, as well as custom four-layer and seven-layer algorithms are supported.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIntegration with Cloud Management Platform\u003c\/td\u003e\n\u003ctd\u003eInterface with mainstream cloud management platforms such as OpenStack to enable automatic translation and distribution of configurations.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTwo-way Load Balancing\u003c\/td\u003e\n\u003ctd\u003eInbound and outbound link load balancing helps improve bandwidth utilization of multi-link resources.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDNS Transparent Proxy\u003c\/td\u003e\n\u003ctd\u003eBased on load balancing algorithm, it forwards DNS request on behalf of users to avoid DNS overload of a single operator and maintain a balance of bandwidth utilization among multiple operator lines.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIntelligent DNS\u003c\/td\u003e\n\u003ctd\u003eIntelligent selection of operator link egress based on traffic\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDynamic and Intelligent Adjustment\u003c\/td\u003e\n\u003ctd\u003eDynamic and intelligent adjustment of link exits are allowed based on load, packet loss rate, delay, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Health Check\u003c\/td\u003e\n\u003ctd\u003eProvide multiple health check algorithms, including ARP, ICMP, TCP, HTTP, DNS, service-based, content-based, custom four-layer to seven-layer, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Scheduling Algorithms\u003c\/td\u003e\n\u003ctd\u003eRich scheduling algorithms are provided, including polling, weighted polling, minimum connection, weighted minimum connection, source address hash, Source address hash, destination address hash, minimum expected delay, minimum queue, random, weighted random, type of data application, proximity, and bandwidth algorithm.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Backup\u003c\/td\u003e\n\u003ctd\u003eSeveral links can serve as backups for each other, enabling link backup.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDNS-based Global\u003c\/td\u003e\n\u003ctd\u003eGlobal DNS-based resolution and data synchronization between devices are enabled, thus switching user traffic to the best data center.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIPanycast-based Global\u003c\/td\u003e\n\u003ctd\u003eCompatible with RIP, OSPF and other routing protocols, it can publish IP address of virtual services through multiple dynamic routing protocols, make a difference in routing through changing the value of cost, and switch user traffic to the best data center.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eGlobal Health Check\u003c\/td\u003e\n\u003ctd\u003eRTT dynamic monitoring, dynamic publishing of healthy routing, and detection of data center availability and accessibility are allowed.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eGlobal Fault Alarm\u003c\/td\u003e\n\u003ctd\u003eBy using email, SMS and SNMP Trap, administrators can select alarm trigger events and alarm methods based on the concerns of business security in the domain, such as server downtime, network attacks, link interruption, and other failures.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDDoS\u003c\/td\u003e\n\u003ctd\u003eDoS and DDoS protections are provided to ensure normal operation of daily business.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFirewall\u003c\/td\u003e\n\u003ctd\u003eSupport stateful firewall, packet filtering, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNAT\u003c\/td\u003e\n\u003ctd\u003eSupport source NAT, destination NAT, one-to-one NAT, NAT address pool and other NAT functions.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBasic Attack Protection\u003c\/td\u003e\n\u003ctd\u003eSupport basic attack protection such as DoS\/DDoS and SYN Flood attacks, HTTP Flood and intrusion prevention of large traffic\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=8\" data-mce-href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=8\"\u003eADX3000 Application Delivery Platform White Paper Technical white paper\u003c\/a\u003e\u003c\/p\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=41\" data-mce-href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=41\"\u003eTechnical White Paper on VSM - TECHNICAL WHITE PAPER\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0623\/20200623043716405.pdf\" target=\"_blank\"\u003eADX3000 Application Delivery Platform - DATA SHEET\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-05-02T12:29:22+08:00","created_at":"2023-05-02T12:29:22+08:00","vendor":"DPtech","type":"Network Management","tags":[],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45069066371362,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Application Delivery Platform","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-Application-Delivery-Platform-3301.jpg?v=1695244427"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Application-Delivery-Platform-3301.jpg?v=1695244427","options":["Title"],"media":[{"alt":"DPtech Application Delivery Platform - vnetwork","id":34458395967778,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Application-Delivery-Platform-3301.jpg?v=1695244427"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Application-Delivery-Platform-3301.jpg?v=1695244427","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eBridging the gap between networks and applications, DPtech ADX addresses the increasing number of users and their growingly higher requirements for application. Users are provided with fast and safe access, and uninterrupted stability around the clock. In addition, it helps bring down operation costs while delivering high performance. As the industry’s first 3.2T application delivery platform, ADX features strong processing abilities, comprehensive application delivery capabilities, and abundant interfaces, thus is applicable to data centers and network egress for various industries and operators. It also provides outstanding service values such as improving the reliability and responsiveness of services and contributing to flexible business expansion.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible Deployment\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIt can be deployed in serial\/one by one, bypass and sandwich modes. With high-density Gigabit and 10-Gigabit interfaces, it can meet various needs of complex application environments.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Detection and Intelligent Scheduling\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eMore than 30 health-check algorithms, 20 plus scheduling algorithms and business-based customized models are available. Detection can be performed at the network layer and the application layer. Operation status of servers and links can be inspected. All these measures facilitates a quick selection of the most suitable server and outbound links and ensures highly efficient load sharing.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich Network Features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCompatible with IPv4\/IPv6, OSPF, RIP, MPLS and other protocols, it is capable of catering to networking requirements of complex network environments.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVersatile fusion\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIntegrating links, servers and global load balancing, it is provided with SSL offload\u0026amp;acceleration, HTTP compression, HTTP compression, anti-DDoS and other application optimization and security protection functions to guarantee fast, safe and readily available applications.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ePersonalized programming\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eAD-Rules is apt at meeting personalized needs of users in scenarios of network egress, server, and data center. It is widely used in such industries as operator, power, and finance.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eThe First 3.2T Application Delivery Platform\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on high-performance hardware architecture APP-X, the maximum performance of a single device can reach 3.2 Tbps, and performance aggregation and multiplication is available through N:M virtualization.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBy applying technologies such as redundant design of key components, separation of data plane from the control plane, and N:M virtualization, it is effective in reducing single points of failure and ensuring 99.999% carrier-grade reliability.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFunction Descriptions\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eComprehensive Functions\u003c\/td\u003e\n\u003ctd\u003eA fusion of link load balancing, server load balancing, global load balancing, SSL offload\u0026amp;acceleration, HTTP compression, Cache and other application delivery technologies.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eApplication Virtualization\u003c\/td\u003e\n\u003ctd\u003eThe N:M virtualization technology can realize virtualization by integrating multiple devices into a resource pool, which is then divided into M logical devices as needed to achieve dynamic scheduling of resource pools in a cloud computing environment.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOutstanding Performance\u003c\/td\u003e\n\u003ctd\u003eMaximum performance of a single device can reach 400 G\u003cstrong\u003e*\u003c\/strong\u003e, and performance aggregation and multiplication is available through N:M virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eExcellent Reliability\u003c\/td\u003e\n\u003ctd\u003eN:M virtualization, silent dual system, dual-system hot standby, VRRP multi-master and other modes are supported to meet reliability needs of various levels.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePersonalized programming\u003c\/td\u003e\n\u003ctd\u003eAD-Rules is apt at meeting personalized needs of users.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eRich Network Features\u003c\/td\u003e\n\u003ctd\u003eIt supports routing protocols such as IPv4\/v6, NAT, MPLS, OSPF, RIP, and dynamic\/static routing.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eConsiderate Design\u003c\/td\u003e\n\u003ctd\u003eLogin and logout of the dynamically expandable server will have no impact on the existing network.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFloating Long Connection\u003c\/td\u003e\n\u003ctd\u003eApplication services with a long connection time can be disconnected actively and reload a new connection according to the predetermined polices.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFour Layers of Load Balancing\u003c\/td\u003e\n\u003ctd\u003eRich 4-layer load balancing algorithms are provided, including polling, weighted polling, minimum connection, weighted minimum connection, source address hash, Source address hash, destination address hash, minimum expected delay, minimum queue, random, weighted random, and minimum server load.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSeven Layers of Load Balancing\u003c\/td\u003e\n\u003ctd\u003eRich 7-layer load balancing algorithms are provided, including minimum server load, http header, http content, polling, weighted polling, minimum connection, weighted minimum connection, source address hash, Source address hash, destination address hash, minimum expected delay, minimum queue, random, and weighted random.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSSL offload\u0026amp;acceleration\u003c\/td\u003e\n\u003ctd\u003eFeaturing SSL proxy, termination, and unload technologies, and supporting SSL hardware acceleration and session persistence, it greatly reduces pressure on servers and shortens user’s access time to resources.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSource Address Traceability\u003c\/td\u003e\n\u003ctd\u003eWith x-fordward-for, it can identify the HTTP request header field of the original IP address of the client connected to the Web server through HTTP proxy or load balancing, making access source traceable.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eConnection Multiplexing\u003c\/td\u003e\n\u003ctd\u003eMultiple connections can be multiplexed into a single connection, and a connection can also be split into multiple connections.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHTTP Compression\u003c\/td\u003e\n\u003ctd\u003eHTTP cache and compression help significantly reduce server pressure, shorten time spent in downloading resources and improve efficiency.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003esession persistence\u003c\/td\u003e\n\u003ctd\u003eProvide a variety of session persistence policies, including source IP, http cookie (multiple cookie modes), http header, http content, SIP, SSL id, RTP\/RTCP\/RTSP, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHealth Detection Algorithm\u003c\/td\u003e\n\u003ctd\u003eARP, ICMP, TCP, HTTP, DNS, service-based and content-based algorithms, as well as custom four-layer and seven-layer algorithms are supported.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIntegration with Cloud Management Platform\u003c\/td\u003e\n\u003ctd\u003eInterface with mainstream cloud management platforms such as OpenStack to enable automatic translation and distribution of configurations.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTwo-way Load Balancing\u003c\/td\u003e\n\u003ctd\u003eInbound and outbound link load balancing helps improve bandwidth utilization of multi-link resources.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDNS Transparent Proxy\u003c\/td\u003e\n\u003ctd\u003eBased on load balancing algorithm, it forwards DNS request on behalf of users to avoid DNS overload of a single operator and maintain a balance of bandwidth utilization among multiple operator lines.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIntelligent DNS\u003c\/td\u003e\n\u003ctd\u003eIntelligent selection of operator link egress based on traffic\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDynamic and Intelligent Adjustment\u003c\/td\u003e\n\u003ctd\u003eDynamic and intelligent adjustment of link exits are allowed based on load, packet loss rate, delay, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Health Check\u003c\/td\u003e\n\u003ctd\u003eProvide multiple health check algorithms, including ARP, ICMP, TCP, HTTP, DNS, service-based, content-based, custom four-layer to seven-layer, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Scheduling Algorithms\u003c\/td\u003e\n\u003ctd\u003eRich scheduling algorithms are provided, including polling, weighted polling, minimum connection, weighted minimum connection, source address hash, Source address hash, destination address hash, minimum expected delay, minimum queue, random, weighted random, type of data application, proximity, and bandwidth algorithm.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLink Backup\u003c\/td\u003e\n\u003ctd\u003eSeveral links can serve as backups for each other, enabling link backup.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDNS-based Global\u003c\/td\u003e\n\u003ctd\u003eGlobal DNS-based resolution and data synchronization between devices are enabled, thus switching user traffic to the best data center.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIPanycast-based Global\u003c\/td\u003e\n\u003ctd\u003eCompatible with RIP, OSPF and other routing protocols, it can publish IP address of virtual services through multiple dynamic routing protocols, make a difference in routing through changing the value of cost, and switch user traffic to the best data center.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eGlobal Health Check\u003c\/td\u003e\n\u003ctd\u003eRTT dynamic monitoring, dynamic publishing of healthy routing, and detection of data center availability and accessibility are allowed.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eGlobal Fault Alarm\u003c\/td\u003e\n\u003ctd\u003eBy using email, SMS and SNMP Trap, administrators can select alarm trigger events and alarm methods based on the concerns of business security in the domain, such as server downtime, network attacks, link interruption, and other failures.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eServer Load Balancing and Optimization\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFeature Description\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDDoS\u003c\/td\u003e\n\u003ctd\u003eDoS and DDoS protections are provided to ensure normal operation of daily business.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFirewall\u003c\/td\u003e\n\u003ctd\u003eSupport stateful firewall, packet filtering, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNAT\u003c\/td\u003e\n\u003ctd\u003eSupport source NAT, destination NAT, one-to-one NAT, NAT address pool and other NAT functions.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBasic Attack Protection\u003c\/td\u003e\n\u003ctd\u003eSupport basic attack protection such as DoS\/DDoS and SYN Flood attacks, HTTP Flood and intrusion prevention of large traffic\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=8\" data-mce-href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=8\"\u003eADX3000 Application Delivery Platform White Paper Technical white paper\u003c\/a\u003e\u003c\/p\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=41\" data-mce-href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1335\u0026amp;id=41\"\u003eTechnical White Paper on VSM - TECHNICAL WHITE PAPER\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0623\/20200623043716405.pdf\" target=\"_blank\"\u003eADX3000 Application Delivery Platform - DATA SHEET\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8252806299938,"title":"Unified Management Center (UMC)","handle":"unified-management-center-umc","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eThe continuous network construction witnesses a growing number and a wider distribution area of network devices and security devices, leaving network management operation and maintenance personnel overwhelmed by the enormous number. Years of experience in network security and applications gave rise to DPtech UMC, or Unified Management Center, an industry-leading platform with converged information management. Through intuitive and real time presentation of network application status, DPtech UMC provides converged intelligent management on software and hardware products based on application services. Its features include network topology, performance chart display, hierarchical fault alarm, unified distribution of policy configuration, and system and domain division, dramatically cutting down network operation and maintenance costs and improving network management efficiency.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eUnified management of existing devices\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eA centralized management of security devices is enabled to achieve flexible and convenient security policy management in large-scale deployment environment by configuring access control policies. Leakage of sensitive information and abuse of non-core services are thereby blocked to ensure the overall security of the network.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eComprehensive analysis on information of the entire network\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThanks to full integration with log collector, database, log analysis, auditing, reports and other functional components, it can conduct all-round traffic analysis of the entire network and automatically corrlation\u0026amp;analysis of security incidents, which helps administrators gain an understand network status, identify potential security risks, and ensure network security.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible deployment and easy management\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCentralized management and hierarchical management are available. Through centralized management, UMC can perform unified configuration and security incident management for all devices in the network. For larger-scaled and partitioned network environments, UMC enables unified management between the headquarters and branches through hierarchical management.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRemote management provides convenience and security\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith B\/S architecture and built-in HTTP server, DPtech UMC allows logins by administrators by means of HTTP or HTTPS from any location to perform network monitoring and management.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFunction Descriptions\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUnified management\u003c\/td\u003e\n\u003ctd\u003eCentralized configuration management, log collection and deep service analysis can be performed on the full range of products from DPtech. Integration with mainstream network and security vendor information is supported.It can serve as a management platform for the entire network to realize highly efficient aggregation of network, security, services and other resources.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eRole based management\u003c\/td\u003e\n\u003ctd\u003eIt is provided with role-based permissions for operations and log viewing, which can be assigned to various roles by administrators.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHierarchical management\u003c\/td\u003e\n\u003ctd\u003eUMC hierarchical management is allowed. In other words, to meet users’ hierarchical management needs, UMCs can be set as separated UMCs subject to independent management, or superior-subordinate UMCs.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIntuitive display of services\u003c\/td\u003e\n\u003ctd\u003eServices can be shown in trend chart, pie chart, line chart and list for easy data analysis.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTopology management\u003c\/td\u003e\n\u003ctd\u003eBy automatically discovering devices in the management range, it can add them into the management platform and display them in a topology diagram.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLog disk management\u003c\/td\u003e\n\u003ctd\u003eHelp users get to know the usage of the log host disk, and the retention days for saving logs can also be set.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eReliable redundancy\u003c\/td\u003e\n\u003ctd\u003eData synchronization between master and standby UMCs is enabled. The time of synchronization can also be specified to improve data storage capacity.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAlarm configuration\u003c\/td\u003e\n\u003ctd\u003eAlarm configuration sets up system alarms in accordance with different alarm methods. Methods allowed include emails, SMS, voice, and others. Alarms can be recorded to facilitate inquiry.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eEvent management\u003c\/td\u003e\n\u003ctd\u003eAbnormal events between the system and the device can be recorded to help system administrators understand the operation of system and device.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eReport management\u003c\/td\u003e\n\u003ctd\u003eThe system can export reports as per required frequency and format, and send the reports to specified recipients. Users can also choose to manually export reports.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperation logs\u003c\/td\u003e\n\u003ctd\u003eIt keeps records of operation logs of each module and function component, helping system administrator understand the operation of system and device.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0624\/20200624112543968.pdf\" target=\"_blank\"\u003eUnified Management Center (UMC)DATA SHEET\u003c\/a\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-05-02T12:06:27+08:00","created_at":"2023-05-02T12:06:27+08:00","vendor":"DPtech","type":"Network Management","tags":[],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45069000966434,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Unified Management Center (UMC)","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Management-Center-UMC-1841.jpg?v=1695244444"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Management-Center-UMC-1841.jpg?v=1695244444","options":["Title"],"media":[{"alt":"DPtech Unified Management Center (UMC) - vnetwork","id":34461801349410,"position":1,"preview_image":{"aspect_ratio":1.0,"height":468,"width":468,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Management-Center-UMC-1841.jpg?v=1695244444"},"aspect_ratio":1.0,"height":468,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-Unified-Management-Center-UMC-1841.jpg?v=1695244444","width":468}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eThe continuous network construction witnesses a growing number and a wider distribution area of network devices and security devices, leaving network management operation and maintenance personnel overwhelmed by the enormous number. Years of experience in network security and applications gave rise to DPtech UMC, or Unified Management Center, an industry-leading platform with converged information management. Through intuitive and real time presentation of network application status, DPtech UMC provides converged intelligent management on software and hardware products based on application services. Its features include network topology, performance chart display, hierarchical fault alarm, unified distribution of policy configuration, and system and domain division, dramatically cutting down network operation and maintenance costs and improving network management efficiency.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eUnified management of existing devices\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eA centralized management of security devices is enabled to achieve flexible and convenient security policy management in large-scale deployment environment by configuring access control policies. Leakage of sensitive information and abuse of non-core services are thereby blocked to ensure the overall security of the network.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eComprehensive analysis on information of the entire network\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThanks to full integration with log collector, database, log analysis, auditing, reports and other functional components, it can conduct all-round traffic analysis of the entire network and automatically corrlation\u0026amp;analysis of security incidents, which helps administrators gain an understand network status, identify potential security risks, and ensure network security.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible deployment and easy management\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCentralized management and hierarchical management are available. Through centralized management, UMC can perform unified configuration and security incident management for all devices in the network. For larger-scaled and partitioned network environments, UMC enables unified management between the headquarters and branches through hierarchical management.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRemote management provides convenience and security\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith B\/S architecture and built-in HTTP server, DPtech UMC allows logins by administrators by means of HTTP or HTTPS from any location to perform network monitoring and management.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATIONS\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Functions\u003c\/th\u003e\n\u003cth\u003eFunction Descriptions\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUnified management\u003c\/td\u003e\n\u003ctd\u003eCentralized configuration management, log collection and deep service analysis can be performed on the full range of products from DPtech. Integration with mainstream network and security vendor information is supported.It can serve as a management platform for the entire network to realize highly efficient aggregation of network, security, services and other resources.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eRole based management\u003c\/td\u003e\n\u003ctd\u003eIt is provided with role-based permissions for operations and log viewing, which can be assigned to various roles by administrators.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHierarchical management\u003c\/td\u003e\n\u003ctd\u003eUMC hierarchical management is allowed. In other words, to meet users’ hierarchical management needs, UMCs can be set as separated UMCs subject to independent management, or superior-subordinate UMCs.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIntuitive display of services\u003c\/td\u003e\n\u003ctd\u003eServices can be shown in trend chart, pie chart, line chart and list for easy data analysis.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTopology management\u003c\/td\u003e\n\u003ctd\u003eBy automatically discovering devices in the management range, it can add them into the management platform and display them in a topology diagram.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLog disk management\u003c\/td\u003e\n\u003ctd\u003eHelp users get to know the usage of the log host disk, and the retention days for saving logs can also be set.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eReliable redundancy\u003c\/td\u003e\n\u003ctd\u003eData synchronization between master and standby UMCs is enabled. The time of synchronization can also be specified to improve data storage capacity.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAlarm configuration\u003c\/td\u003e\n\u003ctd\u003eAlarm configuration sets up system alarms in accordance with different alarm methods. Methods allowed include emails, SMS, voice, and others. Alarms can be recorded to facilitate inquiry.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eEvent management\u003c\/td\u003e\n\u003ctd\u003eAbnormal events between the system and the device can be recorded to help system administrators understand the operation of system and device.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eReport management\u003c\/td\u003e\n\u003ctd\u003eThe system can export reports as per required frequency and format, and send the reports to specified recipients. Users can also choose to manually export reports.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperation logs\u003c\/td\u003e\n\u003ctd\u003eIt keeps records of operation logs of each module and function component, helping system administrator understand the operation of system and device.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0624\/20200624112543968.pdf\" target=\"_blank\"\u003eUnified Management Center (UMC)DATA SHEET\u003c\/a\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8250550190370,"title":"AP1000-3C","handle":"ap1000-3c","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDPtech AP2000 Series is a wireless access device based on 802.11ac. With an access rate of Gigabit, it marks the upgrade from 100M to the Gigabit era. AP2000 Series adopts a dual-frequency design of 2.4GHz\/5GHz, compatible with the 802.11a\/b\/g\/n standards to realize a smooth transition to 802.11ac. It provides two working modes: Fat and Fit. In Fat mode, the AP2000 Series can work independently, while in Fit mode, it needs to work with DPtech ACS6000 series wireless controllers to establish a network.\u003cbr\u003e\u003c\/span\u003e\u003cbr\u003e\u003cspan\u003eAP2000 Series wireless access device can be widely used in various wireless scenarios, such as office buildings, schools, hotels, hospitals, commerce and finance, with multiple installation methods available: ceiling mounted, wall mounted, recessed, desktop placement and crane structures.\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv title=\"Page 1\" class=\"page\"\u003e\n\u003cdiv class=\"section\"\u003e\n\u003cdiv class=\"layoutArea\"\u003e\n\u003cdiv class=\"column\"\u003e\n\u003cul\u003e\n\u003cli\u003eHigh-speed wireless access\u003cspan style=\"font-size: 1.4em;\"\u003e\u003cbr\u003e\u003c\/span\u003eWith the latest 802.11ac wireless chip and the MU-MIMO technology, the AP2000 Series can not only provide excellent performance in 2.4G compared with traditional 802.11n wireless access device, but also high speed access in 5G frequency. When both frequencies are enabled, the device will allow a maximum access rate of 1.75Gbps.\u003cbr\u003e\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eFat\/Fit AP Integration\u003cspan style=\"font-size: 1.4em;\"\u003e\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eThe AP2000 Series can switch flexibly between Fat and Fit modes according to various requirements of application scenarios. With fewer wireless access points, the AP2000 Series can establish a network in Fat mode. With more access points, it can work in Fit mode, and perform centralized management together with DPtech\u003c\/span\u003e\u003cspan\u003e’\u003c\/span\u003e\u003cspan\u003es ACS6000 Series wireless controllers. Fat\/Fit AP integration is conducive to successful transformation of wireless networks, which serves as powerful protection for users\u003c\/span\u003e\u003cspan\u003e’ \u003c\/span\u003e\u003cspan\u003einvestments.\u003cbr\u003e\u003cbr\u003e\u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli\u003eLocal forwarding\u003cspan style=\"font-size: 1.4em;\"\u003e\u003cbr\u003e\u003c\/span\u003eAP2000 Series (Fit mode) supports local forwarding, saving wireless controllers from any traffic bottleneck of wireless network. It can directly convert data packet into messages in standard Ethernet format, which will then enter the wired network for data exchange. Local forwarding greatly alleviates strain on wireless controllers by meeting low latency and high real-time performance requirements of 802.11ac network for large traffic transmission.\u003cbr\u003e\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eMulticast enhancement technology\u003cbr\u003e\u003cspan\u003eTraditional 802.11 protocols send packets with a low rate (1 Mbps), which is subject to high latency and large packet losses in e-schoolbags, conference venues and other real-time wireless applications, leaving users with poor experience. With DPtech\u003c\/span\u003e\u003cspan\u003e’\u003c\/span\u003e\u003cspan\u003es multicast enhancement technology, low-rate multicast packets can be converted into high-rate unicast packet for transmission, providing smooth \u003c\/span\u003eand stable wireless experience for every user.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv title=\"Page 2\" class=\"page\"\u003e\n\u003cdiv class=\"section\"\u003e\n\u003cdiv class=\"layoutArea\"\u003e\n\u003cdiv class=\"column\"\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan\u003eZero configuration installation\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eIn Fit mode, the AP2000 Series requires no settings prior to installation, and all configurations can be downloaded automatically from the wireless controller. It significantly brings down users \u003c\/span\u003e\u003cspan\u003e’ \u003c\/span\u003e\u003cspan\u003eimplementation and maintenance costs.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan\u003eConvenientPower-over-EthernetPort\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eCompatible with power over Ethernet standard protocol (802.3af\/802.3at), the AP2000 Series enables remote power supply with a PoE switch or PoE module. Therefore, there is no need to deploy a dedicated power supply on site for wireless access devices, effectively addressing any inconvenience caused in ceiling-mounted and outdoor scenarios.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan\u003eSupport wireless intrusion detection\/defense (WIDS\/WIPS)\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eIn Fat mode, AP2000 Series provides access control features such as blacklist and whitelist of wireless users. In Fit mode, AP2000 Series can work with DPtech ACS6000 Series wireless controllers, enabling Rogue detection, intrusion detection, blacklist and whitelist, and other WIDS\/WIPS features.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan\u003eInduced roaming\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eAP2000 Series provides induced roaming function, which actively guides a sticky terminal, if found, to the best connection point. It helps effectively improve roaming sensitivity of the sticky terminal, reduce network delay, and maximize wireless network capacity.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan\u003eSupport SSID in Chinese\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eAP2000 Series supports Chinese SSID to cater to the using habits of various users. Users can specify an SSID with a maximum of 32 Chinese characters, or an SSID consisting of a combination of Chinese and English characters.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan\u003eIntegrated wired and wireless management\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eBased on the UMC platform, DPtech \u003c\/span\u003e\u003cspan\u003e’ \u003c\/span\u003e\u003cspan\u003es full range of wireless products realizes integrated management of wired, wireless, security and application delivery across the network. With a simple and friendly user interface for wireless service managers, UMC provides comprehensive management of wireless equipment regarding interfaces, faults, performances, software versions, profiles, accessing users, etc.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eIndoor wireless AP\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eAttributes\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\n\u003cstrong\u003eA\u003c\/strong\u003e\u003cstrong\u003eP2000-2C\u003c\/strong\u003e\n\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eAP2000-3C\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eAP2000-2W\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Positioning\u003c\/td\u003e\n\u003ctd\u003eCeiling\/wall-mounted AP\u003c\/td\u003e\n\u003ctd\u003eCeiling\/wall-mounted AP\u003c\/td\u003e\n\u003ctd\u003eRecessed AP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Working frequency\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e2.4G与5GHz\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTransmission protocol\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e802.11a\/b\/g\/n 802.11ac wave1\/wave2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Number of spatial streams\u003c\/td\u003e\n\u003ctd\u003e2 spatial streams, 2X2 MU-MIMO\u003c\/td\u003e\n\u003ctd\u003e3 spatial streams, 3X3 MU-MIMO\u003c\/td\u003e\n\u003ctd\u003e2 spatial streams, 2X2 MU-MIMO\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTransmission rate\u003c\/td\u003e\n\u003ctd\u003e1.167Gbps\u003c\/td\u003e\n\u003ctd\u003e1.75Gbps\u003c\/td\u003e\n\u003ctd\u003e1.167Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of antenna\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eBuilt-in antenna\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePort\u003c\/td\u003e\n\u003ctd\u003e2 RJ45 ports\u003c\/td\u003e\n\u003ctd\u003e2 RJ45 ports\u003c\/td\u003e\n\u003ctd\u003e4 Gigabit RJ45 downlink ports, 1 Gigabit RJ45 uplink port, 1 pair of pass-through (Telephone) RJ45 port\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTransmitting power\u003c\/td\u003e\n\u003ctd\u003e22dBm\u003c\/td\u003e\n\u003ctd\u003e22dBm\u003c\/td\u003e\n\u003ctd\u003e18dBm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePOE\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCompatible with 802.3af\/802.3at power supply\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLocal power\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e≤12W\u003c\/td\u003e\n\u003ctd\u003e≤12W\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e≤12W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eGreen and energy efficiency\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eScheduled shutdown of wireless access services makes sure energy-saving operations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (length * width * height) (in mm)\u003c\/td\u003e\n\u003ctd\u003e200*200*35.4\u003c\/td\u003e\n\u003ctd\u003e200*200 *35.4\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e86x115*44.5\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eModulation technology\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eOFDM: BPSK@6\/9Mbps, QPSK@12\/18Mbps, 16-QAM@24Mbps, 64-QAM@48\/54Mbps DSSS: DBPSK@1Mbps, DQPSK@2Mbps, CCK@5.5\/11Mbps MIMO-OFDM (11n): MCS 0-15 MIMO-OFDM (11ac): MCS 0-9\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAmbient Temperature\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eOperating Temperature: 0 ºC~40 ºC Storage Temperature: -20ºC~70ºC\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAmbient Humidity\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e5%~95% (non-condensing)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMTBF\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e\u0026gt;250000H\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eOutdoor wireless AP\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eAttributes\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eAP2000-2X\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePositioning\u003c\/td\u003e\n\u003ctd\u003eOutdoor Industrial Dual Band AP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWorking frequency\u003c\/td\u003e\n\u003ctd\u003e802.11b\/g\/n: 2.4 GHz 802.11a\/n\/ac: 5.1GHz\/5.8 GHz\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTransmission rate\u003c\/td\u003e\n\u003ctd\u003e1.167Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of antenna and port\u003c\/td\u003e\n\u003ctd\u003eExternal antenna 1 Gigabit electrical interface and 1 Gigabit optical interface\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTransmitting power\u003c\/td\u003e\n\u003ctd\u003e22dBm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePOE\u003c\/td\u003e\n\u003ctd\u003eCompatible with 802.3af\/802.3at power supply\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e≤22W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eGreen and energy efficiency\u003c\/td\u003e\n\u003ctd\u003eScheduled shutdown of wireless access services makes sure energy-saving operations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e(length * width * height) (in mm)\u003c\/td\u003e\n\u003ctd\u003e220mm*220mm*100mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eModulation technology\u003c\/td\u003e\n\u003ctd\u003eOFDM: BPSK@6\/9Mbps, QPSK@12\/18Mbps, 16-QAM@24Mbps, 64-QAM@48\/54Mbps DSSS: DBPSK@1Mbps, DQPSK@2Mbps, CCK@5.5\/11Mbps MIMO-OFDM (11n): MCS 0-15 MIMO-OFDM (11ac): MCS 0-9\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eProtection level\u003c\/td\u003e\n\u003ctd\u003eIP67\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAmbient Temperature\u003c\/td\u003e\n\u003ctd\u003eOperating Temperature: -40ºC~50ºC Storage Temperature: -40ºC~70ºC\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAmbient Humidity\u003c\/td\u003e\n\u003ctd\u003e5%~95% (non-condensing)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMTBF\u003c\/td\u003e\n\u003ctd\u003e\u0026gt;250000H\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSoftware Specifications\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth colspan=\"2\"\u003e\u003cstrong\u003eAttributes\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003eAP2000-2C\u003c\/th\u003e\n\u003cth\u003eAP2000-3C\u003c\/th\u003e\n\u003cth\u003eAP2000-2W\u003c\/th\u003e\n\u003cth\u003eAP2000-2X\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"2\" class=\"td1\"\u003eVirtual AP\u003c\/td\u003e\n\u003ctd\u003e32 pieces\u003c\/td\u003e\n\u003ctd\u003e32 pieces\u003c\/td\u003e\n\u003ctd\u003e32 pieces\u003c\/td\u003e\n\u003ctd\u003e32 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"2\" class=\"td1\"\u003eConnected users allowed as a whole unit\u003c\/td\u003e\n\u003ctd\u003e256\u003c\/td\u003e\n\u003ctd\u003e384\u003c\/td\u003e\n\u003ctd\u003e256\u003c\/td\u003e\n\u003ctd\u003e256\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"11\" class=\"td1\"\u003eSecurity policy\u003c\/td\u003e\n\u003ctd rowspan=\"3\" class=\"td1\"\u003eAccess authentication\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport MAC, 802.1x, Portal, PSK and other authentication modes\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport SMS authentication\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport non-sending authentication\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eEncryption\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport 64\/128-bit WEP, TKIP, WAPI, CCMP and other encryption methods\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"3\" class=\"td1\"\u003eUser isolation\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport layer 2 isolation of wireless users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport SSID-based wireless user isolation\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport user isolation under the same SSID\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eData frame filtering\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport whitelist and blacklist\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e802.11w\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHide SSID\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"2\" class=\"td1\"\u003eBasis\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSmart switch\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003esignal intensity, bit error rate, whether neighboring APs work properly, etc\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"5\" class=\"td1\"\u003eFunctions of Layers 2 and 3\u003c\/td\u003e\n\u003ctd class=\"td1\"\u003eIP address settings\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport static IP address or DHCP acquisition of IP address\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eRouting Protocols\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport static routing\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eForwarding modes\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport centralized and local forwarding\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eRoaming\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport Layers 2 and 3 roaming\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"3\" class=\"td1\"\u003eService Quality\u003c\/td\u003e\n\u003ctd class=\"td1\"\u003e802.11e\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport WMM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTraffic Limitations\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eTraffic limitations are available based on SSID uplink and downlink traffic\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eQoS policy mapping\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport mapping SSID\/VLAN to QoS policy\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"5\" class=\"td1\"\u003eSignal quality\u003c\/td\u003e\n\u003ctd rowspan=\"2\" class=\"td1\"\u003eTransmitting power adjustment\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport manual power adjustment\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport automatic power adjustment; AP may adjusts power according to nearby wireless network conditions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"2\" class=\"td1\"\u003eChannel settings\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport manual channel settings\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport automatic channel adjustment; AP may adjusts channel according to nearby wireless network conditions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSpectrum protection\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport spectrum protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"9\" class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd rowspan=\"3\" class=\"td1\"\u003eNetwork management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport management through SSH, Telnet, and FTP\/TFTP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd colspan=\"6\"\u003eSupport Web management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitch between Fat\/Fit\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport local switching of modes\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWatch Dog\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupport real-time monitoring of running status to avoid downtime\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLogs\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAlerts\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFault detection\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eStatistics\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd rowspan=\"3\" class=\"td1\"\u003eSecurity functions\u003c\/td\u003e\n\u003ctd class=\"td1\"\u003eTerminal whitelist\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eOnly terminals in the whitelist are allowed to access the wireless network\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAP Self-Secure\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eAnti-hijacking\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity protection\u003c\/td\u003e\n\u003ctd colspan=\"6\"\u003eAnti-DDoS attacks\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630103621931.pdf\"\u003eDPtech AP2000 Series based on 802.11ac Wireless Access Device data sheet\u003c\/a\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-30T15:41:06+08:00","created_at":"2023-04-30T15:41:06+08:00","vendor":"DPtech","type":"WiFi Access Point and Controller","tags":["Access Points"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45060878303522,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":null,"requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"AP1000-3C","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":null}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-AP1000-3C-8589.jpg?v=1695244412"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-AP1000-3C-8589.jpg?v=1695244412","options":["Title"],"media":[{"alt":"DPtech AP1000-3C - vnetwork","id":34457414041890,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-AP1000-3C-8589.jpg?v=1695244412"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-AP1000-3C-8589.jpg?v=1695244412","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDPtech AP2000 Series is a wireless access device based on 802.11ac. With an access rate of Gigabit, it marks the upgrade from 100M to the Gigabit era. AP2000 Series adopts a dual-frequency design of 2.4GHz\/5GHz, compatible with the 802.11a\/b\/g\/n standards to realize a smooth transition to 802.11ac. It provides two working modes: Fat and Fit. In Fat mode, the AP2000 Series can work independently, while in Fit mode, it needs to work with DPtech ACS6000 series wireless controllers to establish a network.\u003cbr\u003e\u003c\/span\u003e\u003cbr\u003e\u003cspan\u003eAP2000 Series wireless access device can be widely used in various wireless scenarios, such as office buildings, schools, hotels, hospitals, commerce and finance, with multiple installation methods available: ceiling mounted, wall mounted, recessed, desktop placement and crane structures.\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv title=\"Page 1\" class=\"page\"\u003e\n\u003cdiv class=\"section\"\u003e\n\u003cdiv class=\"layoutArea\"\u003e\n\u003cdiv class=\"column\"\u003e\n\u003cul\u003e\n\u003cli\u003eHigh-speed wireless access\u003cspan style=\"font-size: 1.4em;\"\u003e\u003cbr\u003e\u003c\/span\u003eWith the latest 802.11ac wireless chip and the MU-MIMO technology, the AP2000 Series can not only provide excellent performance in 2.4G compared with traditional 802.11n wireless access device, but also high speed access in 5G frequency. When both frequencies are enabled, the device will allow a maximum access rate of 1.75Gbps.\u003cbr\u003e\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eFat\/Fit AP Integration\u003cspan style=\"font-size: 1.4em;\"\u003e\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003eThe AP2000 Series can switch flexibly between Fat and Fit modes according to various requirements of application scenarios. With fewer wireless access points, the AP2000 Series can establish a network in Fat mode. With more access points, it can work in Fit mode, and perform centralized management together with DPtech\u003c\/span\u003e\u003cspan\u003e’\u003c\/span\u003e\u003cspan\u003es ACS6000 Series wireless controllers. Fat\/Fit AP integration is conducive to successful transformation of wireless networks, which serves as powerful protection for users\u003c\/span\u003e\u003cspan\u003e’ \u003c\/span\u003e\u003cspan\u003einvestments.\u003cbr\u003e\u003cbr\u003e\u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli\u003eLocal forwarding\u003cspan style=\"font-size: 1.4em;\"\u003e\u003cbr\u003e\u003c\/span\u003eAP2000 Series (Fit mode) supports local forwarding, saving wireless controllers from any traffic bottleneck of wireless network. It can directly convert data packet into messages in standard Ethernet format, which will then enter the wired network for data exchange. Local forwarding greatly alleviates strain on wireless controllers by meeting low latency and high real-time performance requirements of 802.11ac network for large traffic t