Designed for secure network and office network, DPtech Self-Secure secure network Solution can be widely adopted in enterprises, governments and more.
Devoted itself to becoming a leader in implementing next generation security network, DPtech comes up with a brand new construction idea of Whitelist with management and control as the core, compared to the traditional Blacklist mechanism featuring interconnection as the core. Relying on years of deep understanding of user needs, DPtech builds a Self-Secure Network integrating Self-Secure Internet of Things, Self-Secure secure network, and Self-Secure data center by taking advantage of its products and solutions, thus making a critical change from network security to security network.
Choosing a selection results in a full page refresh.
Opens in a new window.
Net Orders Checkout
Item
Price
Qty
Total
Subtotal
RM0.00
Shipping
Total
Shipping Address
Shipping Methods
[{"id":436572061986,"handle":"access-control-integration","title":"Access Control \u0026 Integration","updated_at":"2023-09-23T02:51:50+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003evnetwork combines product, service, and expertise to ensure total integration in every single facet of a building’s openings — from the mechanical and electronic components of the actual door structure to the software and hardware that manages and uses the flow of data.\u003c\/span\u003e","published_at":"2023-02-17T20:35:45+08:00","sort_order":"best-selling","template_suffix":"access-control","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Access Control \u0026 Integration"}],"published_scope":"web","image":{"created_at":"2023-07-31T00:02:11+08:00","alt":null,"width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/X-as-a-Services_1366_x_500_px.png?v=1695408710"}},{"id":443347861794,"handle":"access-points","title":"Access Points","updated_at":"2023-10-03T04:40:50+08:00","body_html":"\u003cp\u003eCheckout our range next-generation cloud-managed Wi-Fi access points.\u003c\/p\u003e","published_at":"2023-05-01T13:08:55+08:00","sort_order":"manual","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Access Points"},{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"}],"published_scope":"web"},{"id":440084267298,"handle":"airmedia®","title":"AirMedia® Wireless Presentation","updated_at":"2023-09-23T02:51:52+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eWith AirMedia® wireless conferencing technology you can transform any space into a high quality conferencing space. Whether you’re in a huddle room, lounge, or mixed use room, it’s easy to present, share, and host a meeting from any device.\u003c\/span\u003e","published_at":"2023-03-28T22:13:17+08:00","sort_order":"best-selling","template_suffix":"airmedia-wireless-presentation","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"AirMedia® Wireless Presentation"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:26:41+08:00","alt":"AirMedia® Wireless Presentation","width":1920,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/AirMedia-Wireless-Presentation-7859.png?v=1695408712"}},{"id":436721189154,"handle":"all-products","title":"All Products","updated_at":"2023-10-03T17:15:51+08:00","body_html":"","published_at":"2023-02-19T23:44:15+08:00","sort_order":"manual","template_suffix":"","disjunctive":false,"rules":[{"column":"variant_price","relation":"greater_than","condition":"0"}],"published_scope":"web"},{"id":439805772066,"handle":"applications","title":"Applications","updated_at":"2023-09-23T02:51:54+08:00","body_html":"\u003cp class=\"u-h1\"\u003eAdvance your business and IT goals with ExtremeApplications\u003c\/p\u003e","published_at":"2023-03-25T13:04:05+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Applications"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:39+08:00","alt":"Applications","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Applications-1747.jpg?v=1695408714"}},{"id":436612563234,"handle":"arcules","title":"Arcules","updated_at":"2023-09-23T02:51:55+08:00","body_html":"","published_at":"2023-02-18T08:46:11+08:00","sort_order":"best-selling","template_suffix":"arcules","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Arcules"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:36+08:00","alt":"Arcules","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Arcules-7236.png?v=1695408715"}},{"id":436572127522,"handle":"audio-visual-conferencing","title":"Audio Visual \u0026 Conferencing","updated_at":"2023-09-23T02:51:56+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eFrom voice-control to facilitate “no-touch” rooms, to multi-platform video conferencing, our expertise can be leveraged to simply pick a new phone system with modern capabilities or design a fully integrated boardroom.\u003c\/span\u003e","published_at":"2023-02-17T20:36:20+08:00","sort_order":"best-selling","template_suffix":"audio-visual-conferencing","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Enterprise Room Solutions"},{"column":"type","relation":"equals","condition":"Digital Workplace"},{"column":"type","relation":"equals","condition":"AirMedia® Wireless Presentation"},{"column":"type","relation":"equals","condition":"DM NVX® AV-over-IP"},{"column":"type","relation":"equals","condition":"Room Scheduling"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:33+08:00","alt":"Audio Visual \u0026 Conferencing","width":663,"height":663,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Audio-Visual-Conferencing-3760.webp?v=1695408716"}},{"id":444388639010,"handle":"aura","title":"Aura","updated_at":"2023-09-18T02:30:47+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eAvaya Aura Platform delivers dependable, secure, and scalable unified communications and customer service solutions throughout your business. Now, extend your capabilities by adding Avaya innovations to enhance your employee and customer experiences. All with no disruption to day-to-day operations.\u003c\/span\u003e","published_at":"2023-05-12T18:10:25+08:00","sort_order":"best-selling","template_suffix":"aura","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Aura"}],"published_scope":"web"},{"id":437797060898,"handle":"automated-infrastructure-management","title":"Automated Infrastructure Management","updated_at":"2023-07-28T20:38:38+08:00","body_html":"","published_at":"2023-03-03T22:27:14+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Automated Infrastructure Management"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:38:37+08:00","alt":"Automated Infrastructure Management","width":350,"height":225,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Automated-Infrastructure-Management-3942.jpg?v=1690547918"}},{"id":436551254306,"handle":"avaya","title":"Avaya","updated_at":"2023-09-28T21:09:47+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eGo with Avaya to get the most out of your communications—on prem, in the cloud, or hybrid. Make every experience with your business seamless and connected. So, employee collaboration is easier and more efficient, and customer satisfaction is higher. Avaya solutions make it happen.\u003c\/span\u003e","published_at":"2023-02-17T18:06:21+08:00","sort_order":"manual","template_suffix":"avaya","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Avaya"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:13+08:00","alt":"Avaya","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-7866.png?v=1695408719"}},{"id":443049640226,"handle":"call-center-lite","title":"Avaya Call Center Lite","updated_at":"2023-08-31T03:58:06+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eWith Avaya Call Center Elite, you run a full-featured call center that handles inbound and outbound contacts, all manageable with real-time and historical reporting insights. And now you can enhance employee and customer experiences, driving higher satisfaction and loyalty, by adding Avaya innovations to your contact center. All without disrupting your current operations.\u003c\/span\u003e","published_at":"2023-04-27T22:23:35+08:00","sort_order":"best-selling","template_suffix":"call-center-lite","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Contact Center"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:22+08:00","alt":"Avaya Call Center Lite","width":770,"height":513,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-Call-Center-Lite-6533.jpg?v=1690548502"}},{"id":436553154850,"handle":"avaya-cloud-office","title":"Avaya Cloud Office","updated_at":"2023-07-28T20:48:16+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"av-eyebrow-text\"\u003e\n\u003cp data-mce-fragment=\"1\" class=\"text-tiny-body\"\u003e\u003cstrong\u003eA cloud phone system that works where and how you do\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"bullets\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003eSet employees up for non-stop productivity with our all-in-one app that works everywhere and every way your business does. Call, meet, message and more—everything is always handy on any device, in any location. \u003c\/p\u003e\n\u003cbr\u003e\u003cstrong\u003eConnect with calling and chat \u003c\/strong\u003e\n\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"bullets\"\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" class=\"bullets\"\u003e\n\u003cbr\u003eA cohesive and collaborative workplace starts with giving everyone more ways to be heard.\u003c\/div\u003e","published_at":"2023-02-17T18:38:27+08:00","sort_order":"best-selling","template_suffix":"avaya-cloud-office","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Avaya Cloud Office"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:16+08:00","alt":"Avaya Cloud Office","width":590,"height":590,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-Cloud-Office-1138.png?v=1690548496"}},{"id":460888408354,"handle":"avaya-devices","updated_at":"2023-09-28T21:09:47+08:00","published_at":"2023-09-28T17:38:55+08:00","sort_order":"manual","template_suffix":"","published_scope":"web","title":"Avaya Devices","body_html":""},{"id":436642742562,"handle":"avaya-spaces","title":"Avaya Spaces","updated_at":"2023-07-28T20:48:21+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eMeetings end, but teamwork must continue. Avaya Spaces connects you with all your people and tools—all in one place, as long as you need. Meet, call, chat, share files, manage tasks. All wrapped in real-time notifications.\u003c\/span\u003e","published_at":"2023-02-18T20:44:38+08:00","sort_order":"best-selling","template_suffix":"avaya-spaces","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Avaya Spaces"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:20+08:00","alt":"Avaya Spaces","width":590,"height":590,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-Spaces-7705.png?v=1690548501"}},{"id":436570390818,"handle":"avaya-ucaas","title":"Avaya UCaaS","updated_at":"2023-07-28T20:48:19+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eUnderstanding communications from the cloud, UCaaS, is simpler than it seems — in fact, you’re likely already using it today. When you chat with an agent, video call your colleagues, or FaceTime your friends — all of that is cloud communication. Even opening an app to create a simple video message is UCaaS or \u003c\/span\u003e\u003ca href=\"https:\/\/www.avaya.com\/en\/products\/ucaas\/\" target=\"_blank\"\u003eUnified Communications as a Service.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eBusinesses use UCaaS to expand their communications options — moving beyond simple voice into chat\/messaging as well as video meetings. Additionally, it can simplify your communications. For example, an employee can have one number for voice, texting, and fax, and that number carries across all their devices, whether they are on a desk phone, mobile, or laptop. But it’s not just about employees — you can also use UCaaS to benefit your customers. For customers, UCaaS can mean improved agent reachability, additional support for remote agents and workers, and having an all-in-one solution creating a holistic customer experience that makes them feel valued.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-17T20:03:03+08:00","sort_order":"best-selling","template_suffix":"avaya-ucaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Avaya UCaaS"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:48:18+08:00","alt":"Avaya UCaaS","width":590,"height":590,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Avaya-UCaaS-4344.png?v=1690548499"}},{"id":439662674210,"handle":"cable-management","title":"Cable Management","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eCable management involves organizing your cabling and connectivity hardware in a way that makes it easy to identify components and troubleshoot problems. This makes future upgrades and repairs easier while keeping your IT spaces professional. \u003c\/span\u003e","published_at":"2023-03-23T21:22:50+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Cable Management"}],"published_scope":"web"},{"id":436612071714,"handle":"cambium-network-xirrus","title":"Cambium Network Xirrus","updated_at":"2023-09-24T00:19:56+08:00","body_html":"\u003ch2 id=\"h-the-xirrus-portfolio-is-now-a-part-of-cambium-networks\" data-mce-fragment=\"1\"\u003eThe Xirrus portfolio is now a part of Cambium Networks\u003c\/h2\u003e\n\u003cp class=\"has-medium-font-size\" data-mce-fragment=\"1\"\u003eThe Cambium Networks wireless fabric portfolio of solutions now includes:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/wifi\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/wifi\/\"\u003eHigh-Capacity Wi-Fi access points\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-cloud\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-cloud\/\"\u003eXMS cloud management\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-enterprise\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/xms-enterprise\/\"\u003eXMS enterprise on-premises management\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/wifi-designer\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/wifi-designer\/\"\u003eWi-Fi Designer\u003c\/a\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/value-profiler\/\" data-mce-fragment=\"1\" data-mce-href=\"https:\/\/www.cambiumnetworks.com\/products\/software\/value-profiler\/\"\u003eValue Profiler\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e","published_at":"2023-02-18T08:39:54+08:00","sort_order":"best-selling","template_suffix":"xirrus","disjunctive":false,"rules":[{"column":"vendor","relation":"contains","condition":"Xirrus"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:55:54+08:00","alt":"Cambium Network Xirrus","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Cambium-Network-Xirrus-6013.png?v=1690548955"}},{"id":445760045346,"handle":"certifiers","title":"Certifiers","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eA cable certifier is a device designed to measure the integrity and transmission characteristics of cabling. A cable certifier can perform various functions to test network cabling for compliance with cabling standards developed by bodies such as the Telecommunications Industry Association (TIA) and the International Organization for Standardization (ISO) to name a few. A cable certifier is useful to local area network (LAN) administrators, cable installers, and field service providers for testing and certifying cabling installations as compliant with these standards.\u003c\/span\u003e","published_at":"2023-05-23T15:39:51+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Certifiers"}],"published_scope":"web"},{"id":445590438178,"handle":"certifiers-qualifiers-and-verifiers","title":"Certifiers, Qualifiers and Verifiers","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp class=\"rich-text__heading rte h1\"\u003e\u003cstrong\u003ePrevent unplanned network outages now\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eYour reliable source for testing, qualifying and certifying cabling networks based on global technological standards.\u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-05-22T12:19:48+08:00","sort_order":"best-selling","template_suffix":"certifiers-qualifiers","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Certifiers, Qualifiers and Verifiers"}],"published_scope":"web","image":{"created_at":"2023-07-28T20:55:56+08:00","alt":"Certifiers, Qualifiers and Verifiers","width":1280,"height":720,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Certifiers-Qualifiers-and-Verifiers-4751.jpg?v=1690548957"}},{"id":456795259170,"handle":"clearance","title":"Clearance","updated_at":"2023-09-27T21:36:42+08:00","body_html":"","published_at":"2023-08-30T16:41:07+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Clearance"}],"published_scope":"web"},{"id":439805706530,"handle":"cloud-managed-networking","title":"Cloud Managed Networking","updated_at":"2023-07-28T21:04:57+08:00","body_html":"\u003cp\u003eReduce Risk and Simplify Operations by Managing 1 Network from 1 Cloud\u003c\/p\u003e","published_at":"2023-03-25T13:01:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Cloud Managed Networking"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:04:57+08:00","alt":"Cloud Managed Networking","width":1980,"height":660,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Cloud-Managed-Networking-8313.jpg?v=1690549497"}},{"id":443039580450,"handle":"cloud-management","title":"Cloud Management","updated_at":"2023-10-03T21:00:03+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eManage thousands of infrastructure devices across wired, wireless, SD-WAN, IoT, and 3rd party from a single cloud instance along with enhanced data capabilities.\u003c\/span\u003e","published_at":"2023-04-27T19:50:24+08:00","sort_order":"best-selling","template_suffix":"network-management","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Network Management"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:04:59+08:00","alt":"Cloud Management","width":1000,"height":565,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Cloud-Management-1874.jpg?v=1690549499"}},{"id":439410032930,"handle":"collaboration","title":"Collaboration","updated_at":"2023-07-28T21:04:56+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\u003cspan\u003eEnjoy higher productivity and complete projects faster together\u003c\/span\u003e\u003c\/h2\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eMeetings end, but teamwork must continue. Avaya Spaces connects you with all your people and tools—all in one place, as long as you need. Meet, call, chat, share files, manage tasks. All wrapped in real-time notifications.\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003e\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-03-21T22:37:34+08:00","sort_order":"best-selling","template_suffix":"collaboration","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Collaboration"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:04:55+08:00","alt":"Collaboration","width":600,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Collaboration-1503.png?v=1690549496"}},{"id":455830208802,"handle":"commscope","title":"Commscope","updated_at":"2023-09-27T21:38:44+08:00","body_html":"","published_at":"2023-08-22T10:42:18+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Commscope"}],"published_scope":"web"},{"id":436722139426,"handle":"conference-phones","title":"Conference Phones","updated_at":"2023-09-04T20:07:36+08:00","body_html":"","published_at":"2023-02-19T23:58:19+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Conference Phones"}],"published_scope":"web"},{"id":443377975586,"handle":"controller","title":"Controller","updated_at":"2023-10-03T05:40:08+08:00","body_html":"\u003cp\u003e\u003cspan\u003eHigh-performance, enterprise-class WLAN appliances\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntegrated management, security, and dynamic performance optimization \u003c\/li\u003e\n\u003cli\u003eScalable range of solutions tailor-made for every enterprise environment\u003c\/li\u003e\n\u003cli\u003eDelivers agile, available, and context-aware network access\u003c\/li\u003e\n\u003c\/ul\u003e","published_at":"2023-05-01T18:26:18+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Controller"},{"column":"tag","relation":"equals","condition":"Cloud Managed AP"}],"published_scope":"web"},{"id":445524705570,"handle":"copper-certifiers-qualifiers-and-verifiers","title":"Copper | Certifiers, qualifiers and verifiers","updated_at":"2023-08-31T17:32:24+08:00","body_html":"Despite the latest developments in fiber optic cable technology, copper is still the most common medium network installers and system administrators deal with on a daily basis. New transmission classes always present new challenges for measurement technology. In order to carry out correct measurements, both the correct measurement setup and the suitable measuring instrument are important.","published_at":"2023-05-21T17:16:05+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Copper"},{"column":"vendor","relation":"equals","condition":"Softing"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:15:22+08:00","alt":"Copper | Certifiers, qualifiers and verifiers","width":1150,"height":1206,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Copper-Certifiers-qualifiers-and-verifiers-584.png?v=1690550123"}},{"id":436612530466,"handle":"crestron","title":"Crestron","updated_at":"2023-09-05T02:57:13+08:00","body_html":"Crestron designs and engineers best-in-class hardware and software to work together as a single solution. Built on standard infrastructure, our technology is easy to install and use, scalable, repeatable, and manageable.","published_at":"2023-02-18T08:45:53+08:00","sort_order":"best-selling","template_suffix":"crestron","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Crestron"}],"published_scope":"web","image":{"created_at":"2023-07-31T00:07:20+08:00","alt":null,"width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_1000_x_500_px_-3.png?v=1690733240"}},{"id":436585759010,"handle":"digital-signage-iptv-system","title":"Digital Signage","updated_at":"2023-07-28T21:15:14+08:00","body_html":"\u003csection class=\"shopify-section section\" id=\"shopify-section-template--18251802542370__e5b1db65-ad14-4037-82eb-d39c155340cd\"\u003e\n\u003cdiv class=\"isolate\"\u003e\n\u003cdiv class=\"rich-text content-container color-background-1 gradient rich-text--full-width content-container--full-width section-template--18251802542370__e5b1db65-ad14-4037-82eb-d39c155340cd-padding\"\u003e\n\u003cdiv class=\"rich-text__wrapper rich-text__wrapper--center page-width\"\u003e\n\u003cdiv class=\"rich-text__blocks center\"\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\u003cspan\u003eEye-catching commercial displays that make your brand and business stand out\u003c\/span\u003e\u003c\/h2\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eElectronic displays in high-traffic areas are changing the face of our public spaces and the possibilities for digital signage are everywhere. Whether used for informational messaging, advertising, entertainment or architectural ambiance, these digital signage displays can transform the experiences of shopping, working and socializing.\u003c\/p\u003e\n\u003cp\u003eInteractive and touch displays will take your digital signage to the next level. Create a personal experience for your viewer to help them better remember your brand and message.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/section\u003e\n\u003csection class=\"shopify-section section\" id=\"shopify-section-template--18251802542370__cd3daeba-876c-4775-a3aa-68880901ce89\"\u003e\n\u003cdiv class=\"isolate\"\u003e\n\u003cdiv class=\"rich-text content-container color-background-1 gradient rich-text--full-width content-container--full-width section-template--18251802542370__cd3daeba-876c-4775-a3aa-68880901ce89-padding\"\u003e\n\u003cdiv class=\"rich-text__wrapper rich-text__wrapper--center page-width\"\u003e\n\u003cdiv class=\"rich-text__blocks center\"\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\u003cspan\u003eYour Digital Signage Solutions All In One Place\u003c\/span\u003e\u003c\/h2\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eWe work with a variety of software and equipment vendors to ensure that every digital signage project is specifically designed to best support the unique location, content and ongoing management requirements for each customers.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003eRoom Scheduling\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eLets your workforce quickly book the right space with the right technology. All while helping you manage occupation density and providing utilization data for better real estate planning.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003eWayfinding\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eContextual signage makes it easy for visitors to know where they are and how to get where they are going. Wayfinding signage can switch during emergencies to displaying safety information, evacuation plans and directions to the closest emergency exits.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003eDigital Posters \u0026amp; Advertisements\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eGet your business a window poster, that is displayed on a screen instead of on paper or clings. It can let you share more messages in the same space with a slideshow-style group of promotions. Unlike standard window signage, they are lit so that they can be viewed even at night and will cut through glare far better than paper. \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/section\u003e","published_at":"2023-02-18T00:30:21+08:00","sort_order":"best-selling","template_suffix":"digitalsignage","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Digital Signage"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:15:13+08:00","alt":"Digital Signage","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Digital-Signage-3443.jpg?v=1690550114"}},{"id":440135221538,"handle":"dm-nvx®-av-over-ip","title":"DM NVX® AV-over-IP","updated_at":"2023-09-05T02:57:42+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eContent drives everything we do–at work, at school and at play. Distributing content is what DM NVX AV-over-IP does for every type of organization–flawlessly and securely. It is the industry leader that sets the standard. There’s no challenge a DM NVX solution cannot meet, no type of content it can’t distribute–across campuses, throughout offices and around the world.\u003c\/span\u003e","published_at":"2023-03-29T11:11:00+08:00","sort_order":"best-selling","template_suffix":"dm-nvx-av-over-ip","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"DM NVX® AV-over-IP"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:15:18+08:00","alt":"DM NVX® AV-over-IP","width":879,"height":879,"src":"\/\/v-network.net\/cdn\/shop\/collections\/DM-NVX-AV-over-IP-5123.jpg?v=1690550118"}},{"id":443305165090,"handle":"dptech","title":"DPtech","updated_at":"2023-10-03T21:00:03+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003eDPtech ADX addresses the increasing number of users and their growingly higher requirements for application.\u003c\/p\u003e\n\u003cp\u003eDPtech, built on core technologies of independent intellectual property rights, has launched more than 100 products in a dozen categories. Its products include Deep Service Switching Gateway (DPX), Application Firewall (FW), Intrusion Prevention System (IPS), Anti-DDoS System (Guard\/Probe), Web Application Firewall (WAF), Unified Audit Gateway (UAG), Application Delivery Platform (ADX), switches and routers.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eIn addition, DPtech has further introduced a number of scenario-based solutions for typical application scenarios, including secure network Solution, Self-Secure Branch Offices Solution, Secure IoT Solution, Secure Cloud Data Center Solution featuring “strong power enabled by Cloud security”, and the Internet Egress Solution featuring “Integration, Intelligentization, Easy Management, and Reliable Connection”.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-05-01T00:12:46+08:00","sort_order":"best-selling","template_suffix":"dptech","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"DPtech"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:25:44+08:00","alt":"DPtech","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/DPtech-9017.png?v=1690550745"}},{"id":443290845474,"handle":"endpoint-security","title":"EndPoint Security","updated_at":"2023-09-22T16:56:39+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eModern endpoint protection is designed to provide security against the latest threats no matter where the endpoint sits.\u003c\/p\u003e\n\u003cp\u003eCapture Client’s integration with the Capture Security Center creates a single pane of glass across network and endpoint security operations for centralized control of attack visualization, rollback and remediation, network control and remote shell troubleshooting abilities.\u003c\/p\u003e","published_at":"2023-04-30T19:52:34+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"EndPoint Security"}],"published_scope":"web"},{"id":439408525602,"handle":"enterprise-room-solutions","title":"Enterprise Room Solutions","updated_at":"2023-07-28T21:25:42+08:00","body_html":"\u003cp\u003e\u003cspan\u003eRoom automation makes seamless meetings possible.\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003evnetwork integrates automation and control solutions such as Audio Visual, lighting, shading, security, voice-activated assistants and Building Management Systems, so you can control everything from one platform. From individual room scheduling with easy Outlook integration, to full room control through a single base station, and integration with popular audio equipment manufacturers, the customization for your room automation is endless.\u003c\/p\u003e\n\u003cp\u003eRoom automation makes seamless meetings possible, since you will never have to leave your seat to adjust the lighting during a presentation. You can also unlock or close the door to your office or meeting room, for an added convenience and increased security.\u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-03-21T22:27:27+08:00","sort_order":"best-selling","template_suffix":"enterprise-room-solutions","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Enterprise Room Solutions"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:25:41+08:00","alt":"Enterprise Room Solutions","width":600,"height":400,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Enterprise-Room-Solutions-2283.webp?v=1690550742"}},{"id":443139293474,"handle":"entrypass","title":"Entrypass","updated_at":"2023-07-28T21:25:43+08:00","body_html":"","published_at":"2023-04-28T20:27:38+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Entrypass"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:25:43+08:00","alt":"Entrypass","width":800,"height":800,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Entrypass-8384.jpg?v=1690550743"}},{"id":445760209186,"handle":"ethernet","title":"Ethernet | Certifiers, qualifiers and verifiers","updated_at":"2023-08-29T22:22:40+08:00","body_html":"\u003cp\u003eJust a few years ago, wireless networks were rather the exception in companies. If at all, there were only small Wi-Fi islands, which were not considered conceptually in the planning of the enterprise network. Wi-Fi often meant only one access point in conference rooms. In the current age of smartphones and tablets and the resulting enormous increase in mobile data usage, fast, reliable and consistent Wi-Fi coverage is a must for a company. Multiple connections must be made simultaneously, buildings can be complex, network requirements are constantly changing, and future data rates and standards must be considered.\u003c\/p\u003e\n\n\n","published_at":"2023-05-23T15:41:16+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Ethernet"}],"published_scope":"web"},{"id":436612202786,"handle":"extreme-networks","title":"Extreme Networks","updated_at":"2023-10-03T20:49:49+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eThe modern enterprise demands network agility, scalability, and security—but without the complexity. Extreme Fabric provides a Unified, Automated, and Secure solution that extends across multiple locations and device types, as well as streamlining deployments while isolating threats.\u003c\/span\u003e\n\u003cp\u003e \u003c\/p\u003e","published_at":"2023-10-03T00:30:02+08:00","sort_order":"best-selling","template_suffix":"extreme-network","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Extreme Networks"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:37:50+08:00","alt":"Extreme Networks","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Extreme-Networks-9297.png?v=1690551470"}},{"id":444312092962,"handle":"extreme-wireless","title":"Extreme Wireless","updated_at":"2023-07-03T12:51:49+08:00","body_html":"\u003cdiv class=\"c-content-section__content\"\u003e\n\u003cp\u003eWith the broadest family of next-generation cloud-managed Wi-Fi access points, Extreme Networks is helping customers accelerate in every environment\u003c\/p\u003e\n\u003c\/div\u003e\n\u003cul class=\"c-content-section__cta-list\"\u003e\u003c\/ul\u003e","published_at":"2023-05-11T22:53:25+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Extreme Network"},{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"},{"column":"tag","relation":"equals","condition":"Extreme Wireless"}],"published_scope":"web"},{"id":444307636514,"handle":"extremecloud-iq","title":"ExtremeCloud IQ","updated_at":"2023-10-01T09:41:15+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eDesigned to streamline every aspect of your network from deployment to maintenance, \u003c\/span\u003e\u003cstrong\u003eExtremeCloud™ IQ\u003c\/strong\u003e\u003cspan\u003e has been built with the human element in mind, helping IT and business focus on what’s really important to them instead of dealing with menial and time consuming operational tasks.\u003c\/span\u003e","published_at":"2023-05-11T22:17:09+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"title","relation":"contains","condition":"ExtremeCloud"}],"published_scope":"web"},{"id":444209004834,"handle":"extreme-fabric","title":"Fabric Connect","updated_at":"2023-10-03T20:49:49+08:00","body_html":"\u003cp data-mce-fragment=\"1\"\u003eDelivering a More Unified, Automated, and Secure Enterprise Network\u003c\/p\u003e","published_at":"2023-05-10T23:55:49+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"contains","condition":"Switch"},{"column":"vendor","relation":"equals","condition":"Extreme Networks"}],"published_scope":"web"},{"id":443039514914,"handle":"fabric-connect-switches","title":"Fabric Connect Switches","updated_at":"2023-09-06T06:14:27+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eThe modern enterprise demands network agility, scalability, and security—but without the complexity. Extreme Fabric provides a Unified, Automated, and Secure solution that extends across multiple locations and device types, as well as streamlining deployments while isolating threats.\u003c\/span\u003e","published_at":"2023-04-27T19:49:28+08:00","sort_order":"best-selling","template_suffix":"fabric-connect-switches","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Extreme Fabric"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:37:52+08:00","alt":"Fabric Connect Switches","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Fabric-Connect-Switches-565.png?v=1690551473"}},{"id":445524771106,"handle":"fiber-certifiers-qualifiers-and-verifiers","title":"Fiber | Certifiers, qualifiers and verifiers","updated_at":"2023-08-31T17:32:44+08:00","body_html":"\u003cspan\u003eA reliably functioning IT infrastructure forms the backbone of our modern information age. Especially in data centers, but also in the backbone area of companies and in campus cabling, more and more fiber optic technology is being used today. With increasing bandwidths and ever higher demands on fiber optic cabling, it is no longer sufficient to simply plug cables together and assume that everything will work. The fast and reliable testing of this cabling becomes an absolute \"must\".\u003c\/span\u003e","published_at":"2023-05-21T17:17:32+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Fiber Optics"},{"column":"vendor","relation":"equals","condition":"Softing"}],"published_scope":"web"},{"id":439680008482,"handle":"fiber-optic","title":"Fibre Optic Cabling","updated_at":"2023-07-28T21:46:15+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eFiber optic cabling is frequently used when connecting multiple IDF locations together within a large space, for providing connections that span far distances that exceed what standard Category 5e\/6\/6a cabling can cover, or if a higher speed connection is required.\u003c\/p\u003e\n\u003cp\u003eA fiber optic cable consists of multiple glass cores. Each core is thinner than a human hair and is capable of transmitting data through light waves and achieving higher transmission speeds over a longer distance.\u003c\/p\u003e","published_at":"2023-03-24T00:46:53+08:00","sort_order":"best-selling","template_suffix":"fibreoptic","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Fibre Optic Cabling"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:46:15+08:00","alt":"Fibre Optic Cabling","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Fibre-Optic-Cabling-6401.png?v=1690551975"}},{"id":459324064034,"handle":"firewall","title":"Firewall","updated_at":"2023-09-22T16:56:40+08:00","body_html":"","published_at":"2023-09-17T02:33:11+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Firewall"}],"published_scope":"web"},{"id":436686225698,"handle":"fwaas","title":"Firewall-As-A-Service (FWaaS)","updated_at":"2023-07-28T21:46:10+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork offers comprehensive firewall solutions as a service, ensuring enhanced network security, intrusion prevention, and threat management without the need for on-premises firewall equipment.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:06:34+08:00","sort_order":"best-selling","template_suffix":"fwaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Firewall-As-A-Service (FWaaS)"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:46:09+08:00","alt":"Firewall-As-A-Service (FWaaS)","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Firewall-As-A-Service-FWaaS-9551.png?v=1690551970"}},{"id":436551090466,"handle":"frontpage","updated_at":"2023-09-06T14:18:31+08:00","published_at":"2023-02-17T18:02:50+08:00","sort_order":"best-selling","template_suffix":null,"published_scope":"web","title":"Home page","body_html":null},{"id":439407903010,"handle":"hospitality-iptv","title":"Hospitality IPTV","updated_at":"2023-07-28T21:46:13+08:00","body_html":"\u003cspan data-mce-fragment=\"1\"\u003eWith our IPTV Hospitality solution, your guests are welcomed into their room with a personalised, interactive and intuitive interface. Bring your televisions to life, offer new services, and improve the overall guest experience.\u003c\/span\u003e","published_at":"2023-03-21T22:22:54+08:00","sort_order":"best-selling","template_suffix":"iptv","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Hospitality IPTV"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:46:12+08:00","alt":"Hospitality IPTV","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Hospitality-IPTV-6316.png?v=1690551973"}},{"id":443545714978,"handle":"husky-ivo","title":"Husky IVO™","updated_at":"2023-06-03T16:35:56+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eWhy is the new Husky IVO the best choice for your business? The support, the easy installation, and the products themselves work together to ensure you get the most out of your video management software (VMS).\u003c\/span\u003e\u003cbr\u003e\u003c\/p\u003e","published_at":"2023-05-03T14:16:16+08:00","sort_order":"best-selling","template_suffix":"husky","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Husky IVO"}],"published_scope":"web"},{"id":443049574690,"handle":"hybrid-phone-system","title":"Hybrid Phone System","updated_at":"2023-07-28T21:59:43+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eThe cloud can deliver what you need, but maybe you aren’t ready for a full-cloud solution. Avaya’s hybrid cloud options let you move at your pace. Start by just adding cloud capabilities to your on-premises platform. Or take a faster path to the cloud with an environment that’s built just for you.\u003c\/span\u003e\u003c\/p\u003e\n\u003ch3 class=\"title-h2\"\u003e\n\u003cbr\u003eOn-premises solutions, meet cloud\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cdiv class=\"global-bullets\"\u003e\n\u003cp\u003eDeliver an enriched customer experience by adding a cloud-based solution to what you already have—like Avaya Aura Platform. No need to rip and replace.\u003c\/p\u003e\n\u003cp\u003eLayer on innovations of the Avaya Experience Platform. Let customers connect how they want. Give employees all the tools to meet customers’ needs.\u003cbr\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ch3 class=\"title-h2\"\u003eYour cloud, your way\u003c\/h3\u003e\n\u003cdiv class=\"global-bullets\"\u003e\n\u003cp\u003eFirst, transition your current on-premises platform to Avaya Enterprise Cloud. You keep the familiar Avaya solution you have now—such as Avaya Aura Platform and Avaya Call Center Elite— just in a dedicated instance on Microsoft Azure, the market-leading cloud that delivers savings, scalability, and security. There’s no disruption for customers and no training needed for employees. \u003c\/p\u003e\n\u003cp\u003eNext, easily modernize your customer experience by adding Avaya Experience Platform capabilities.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T22:23:25+08:00","sort_order":"best-selling","template_suffix":"hybrid-phone-system","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Hybrid Phone System"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:43+08:00","alt":"Hybrid Phone System","width":1200,"height":801,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Hybrid-Phone-System-7757.jpg?v=1690552783"}},{"id":439809736994,"handle":"inteliphy-net","title":"inteliPhy net","updated_at":"2023-07-28T21:59:39+08:00","body_html":"inteliPhy net is your easy-to-use DCIM solution for asset, capacity and change management.","published_at":"2023-03-25T15:02:33+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"inteliPhy net"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:38+08:00","alt":"inteliPhy net","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/inteliPhy-net-4280.jpg?v=1690552779"}},{"id":443049541922,"handle":"ip-office","title":"IP Office","updated_at":"2023-09-17T21:55:22+08:00","body_html":"\u003ch3\u003e\u003cspan\u003e\u003cmeta charset=\"UTF-8\"\u003e \u003cstrong\u003ePerfect communications solution for small and medium-size businesses \u003c\/strong\u003e\u003c\/span\u003e\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eStudy your customer calls by setting up call recording, tracking, and reporting. This Avaya Call Reporting capability can be delivered through IP Office to record and document incoming calls. You can also add real-time call center agent seats and dashboards for more efficient call handling.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003eCombine \u003ca href=\"https:\/\/www.avaya.com\/en\/products\/ip-office\/\" data-mce-href=\"https:\/\/www.avaya.com\/en\/products\/ip-office\/\" target=\"_blank\"\u003eAvaya IP Office\u003c\/a\u003e with a subscription for \u003ca href=\"https:\/\/www.avaya.com\/en\/products\/ucaas\/spaces\/\" data-mce-href=\"https:\/\/www.avaya.com\/en\/products\/ucaas\/spaces\/\" target=\"_blank\"\u003eAvaya Spaces\u003c\/a\u003e and you gain a single app for voice, video, messaging, conferencing, and a calendar—all available on any device, in any location. \u003c\/p\u003e","published_at":"2023-04-27T22:23:11+08:00","sort_order":"best-selling","template_suffix":"ip-office","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"IP Office"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:40+08:00","alt":"IP Office","width":1024,"height":1024,"src":"\/\/v-network.net\/cdn\/shop\/collections\/IP-Office-702.jpg?v=1690552781"}},{"id":445302735138,"handle":"ip-phone-system","title":"IP Phone System","updated_at":"2023-08-17T23:22:07+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eAvaya IP Office phone system is the right choice for any small and medium size business today—whether you have 5, 25 or 250 employees, just getting started or already established, regardless you have a single office or multiple locations.\u003c\/span\u003e","published_at":"2023-05-19T14:50:29+08:00","sort_order":"best-selling","template_suffix":"ip-phone-system","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"IP Phone System"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:44+08:00","alt":"IP Phone System","width":755,"height":463,"src":"\/\/v-network.net\/cdn\/shop\/collections\/IP-Phone-System-3491.webp?v=1690552785"}},{"id":436612268322,"handle":"ironyun","title":"IronYun","updated_at":"2023-07-28T21:59:37+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eThe Vaidio AI Vision Platform from IronYun USA adds intelligence for security, safety, health, and operations to any IP camera and dozens of market-leading video management systems - at a fraction of the cost of proprietary systems.\u003c\/span\u003e","published_at":"2023-02-18T08:43:05+08:00","sort_order":"best-selling","template_suffix":"ironyun","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"IronYun"}],"published_scope":"web","image":{"created_at":"2023-07-28T21:59:36+08:00","alt":"IronYun","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/IronYun-4957.png?v=1690552777"}},{"id":443207024930,"handle":"large-enterprise","title":"Large Enterprise","updated_at":"2023-10-02T05:00:02+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eThe SonicWall Network Security services platform (NS\u003cem\u003esp\u003c\/em\u003e) High-End Firewall series delivers the advanced threat protection, fast speeds and budget friendly price that large enterprises, data centers, and service providers demand. Options from multi-instance architectures to unified policy creation makes defending your environment simpler and more effective. It’s security without compromise.\u003c\/p\u003e\n\u003cp\u003eDesigned for large distributed enterprises, data centers, government agencies and service providers, the NS\u003cem\u003esp\u003c\/em\u003e High-End series, pairs advanced technologies like Real-Time Deep Memory Inspection (RTDMI™) with high-speed performance.\u003c\/p\u003e","published_at":"2023-04-29T16:07:12+08:00","sort_order":"best-selling","template_suffix":"large-enterprise","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Large Enterprise"},{"column":"vendor","relation":"equals","condition":"SonicWall"}],"published_scope":"web"},{"id":436612301090,"handle":"legrand","title":"Legrand","updated_at":"2023-07-28T22:07:55+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eLegrand is specialised in electrical and digital building infrastructures, which offer high value-added products and solutions that improve lives by transforming the spaces where people live, work and meet.\u003c\/p\u003e\n\u003cp\u003eWith a wide range of more than 300,000 references of products and solutions in over 100 product families, Legrand improves lives by offering simple, innovative, sustainable solutions for every type of building around the world in various industires.\u003c\/p\u003e","published_at":"2023-02-18T08:43:28+08:00","sort_order":"best-selling","template_suffix":"legrand","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Legrand"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:07:55+08:00","alt":"Legrand","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Legrand-5882.png?v=1690553275"}},{"id":439408656674,"handle":"lighting-occupancy-sensors","title":"Lighting \u0026 Occupancy Sensors","updated_at":"2023-07-28T22:08:02+08:00","body_html":"","published_at":"2023-03-21T22:28:27+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Lighting \u0026 Occupancy Sensors"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:08:01+08:00","alt":"Lighting \u0026 Occupancy Sensors","width":1388,"height":1388,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Lighting-Occupancy-Sensors-3474.jpg?v=1690553282"}},{"id":436612628770,"handle":"linkbroad","title":"LinkBroad","updated_at":"2023-07-31T20:50:08+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003eLinkBroad Interactive TV System Solution is a cutting-edge, interactive digital TV solution meticulously crafted to meet the unique needs of high-end hotels and their discerning guests. The solution is the result of extensive research into hotel room TVs and the lifestyles of hotel guests, ensuring a deep understanding of their preferences.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eAt the heart of the offering is the BroadView system, complemented by the advanced PMS technology of HSIA. Through seamless integration with the dominant PMS system in high-end hotels, Oracle Opera, the Interactive TV Solution delivers a cohesive and unparalleled experience. We provide hotels with a comprehensive package that includes the BroadView system, top-of-the-line network equipment, and a range of services such as consultation, design planning, installation, training, and ongoing support.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eChoose LinkBroad Interactive TV System Solution and elevate your hotel's entertainment offerings with a dynamic and interactive platform that captivates guests while delivering valuable information and enhancing their overall experience.\u003c\/p\u003e","published_at":"2023-02-18T08:46:54+08:00","sort_order":"best-selling","template_suffix":"linkbroad","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"LinkBroad"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:07:59+08:00","alt":"LinkBroad","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/LinkBroad-8201.png?v=1690807808"}},{"id":436612596002,"handle":"lutron","title":"Lutron","updated_at":"2023-09-16T05:21:34+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eLutron offers you comprehensive energy-saving and comfort-control solutions—for light, shade, and temperature—as well as intelligent building integration for all your properties across the globe.\u003c\/p\u003e\n\u003cp\u003eLutron delivers the ideal experience every time. Here's the highlight specific Lutron solutions for each space in your hotel property.\u003c\/p\u003e","published_at":"2023-02-18T08:46:34+08:00","sort_order":"best-selling","template_suffix":"lutron","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Lutron"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:07:57+08:00","alt":"Lutron","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Lutron-6552.png?v=1690553277"}},{"id":436684488994,"handle":"managed-services","title":"Managed Services","updated_at":"2023-06-03T16:35:53+08:00","body_html":"","published_at":"2023-02-19T09:56:35+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Managed Services"}],"published_scope":"web"},{"id":443206926626,"handle":"mid-sized-enterprise","title":"Mid-Sized Enterprise","updated_at":"2023-10-03T20:49:50+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eDefeating advanced threats requires an advanced firewall solution built for the needs of your business. The SonicWall Network Security appliance (NS\u003cem\u003ea\u003c\/em\u003e) Mid-Range Firewall is next-generation security designed specifically for businesses of 250 users and up. Work with the confidence of knowing you’re protected against the day-to-day incursions as well as against advanced threats like ransomware, attacks against non-standard ports, and breaches in firewalls, all at the speed of business.\u003c\/p\u003e\n\u003cp\u003eWith cloud-based and on-box capabilities like TLS\/SSL decryption and inspection, application intelligence and control, secure SD-WAN, real-time visualization, and WLAN management, SonicWall provides flexible, fast and cost-effective security to keep the threats out and your business thriving.\u003c\/p\u003e","published_at":"2023-04-29T16:06:54+08:00","sort_order":"best-selling","template_suffix":"mid-sized-enterprise","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Mid-Sized Enterprise"},{"column":"vendor","relation":"equals","condition":"SonicWall"}],"published_scope":"web"},{"id":436612333858,"handle":"milestone","title":"Milestone","updated_at":"2023-09-07T18:08:14+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eMilestone provides actionable insights from video data through the perfect combination of your cameras and sensors and our open platform software and analytics. – always with a responsible mindset and a people-first approach.\u003c\/span\u003e","published_at":"2023-02-18T08:43:50+08:00","sort_order":"manual","template_suffix":"milestone","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Milestone"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:20:03+08:00","alt":"Milestone","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Milestone-5811.png?v=1690554003"}},{"id":439809507618,"handle":"netscale-48","title":"Netscale 48","updated_at":"2023-07-28T22:20:07+08:00","body_html":"Perfect flexibility, mixed media patch panel","published_at":"2023-03-25T14:58:10+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Netscale 48"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:20:07+08:00","alt":"Netscale 48","width":768,"height":432,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Netscale-48-6384.jpg?v=1690554007"}},{"id":439809474850,"handle":"netscale72","title":"Netscale 72","updated_at":"2023-07-28T22:20:05+08:00","body_html":"Flexible. Dense and automated.","published_at":"2023-03-25T14:57:27+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Netscale72"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:20:05+08:00","alt":"Netscale 72","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Netscale-72-8436.jpg?v=1690554005"}},{"id":439946510626,"handle":"network-security","title":"Network \u0026 Security","updated_at":"2023-10-03T21:00:03+08:00","body_html":"\u003cspan\u003eWe offer wired and wireless access solutions including switches, access points, and cloud services. Leveraging these solutions, IT teams can streamline operations and simplify user and device troubleshooting, while delivering innovative and strategic projects with IoT and location services.\u003c\/span\u003e","published_at":"2023-03-27T13:40:44+08:00","sort_order":"best-selling","template_suffix":"network-security","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Network Switches"},{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"},{"column":"type","relation":"equals","condition":"Network Management"},{"column":"type","relation":"equals","condition":"Self-Secure Networking"},{"column":"type","relation":"equals","condition":"NextGen Firewall \u0026 End Point Security"},{"column":"type","relation":"equals","condition":"Secure Mobile Access"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:41+08:00","alt":"Network \u0026 Security","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-Security-9390.jpg?v=1690554642"}},{"id":439676043554,"handle":"network-cabling","title":"Network Cabling","updated_at":"2023-07-28T22:30:40+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cstrong\u003eVoice and data cabling is a critical piece of infrastructure.— It’s the backbone that gets, and keeps, your network and all network devices up and running.\u003c\/strong\u003e\u003c\/p\u003e\n\u003ch2 class=\"rich-text__heading rte h2\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/h2\u003e\n\u003cp class=\"rich-text__heading rte h2\"\u003e\u003cstrong\u003eWhat is Voice and Data Cabling?\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eVoice and data cabling is also known as structured cabling or ethernet cabling, and consists of having the right cables installed in the right way and at the right locations to allow for transferring data to the right places. These cables are the center of a network that powers computer systems, connects wireless devices, phone systems, copiers, and more. \u003c\/p\u003e\n\u003cp\u003ePhysical cables of various types run from individual equipment to a centralized hub (i.e. server room, telecom closet, etc.). They run behind walls, above ceiling tiles, and even under raised flooring. All to ensure that businesses can keep communication flowing, both within and outside of their physical walls. \u003c\/p\u003e\n\u003cp\u003eCompanies of all sizes can benefit from a structured voice and data cabling system. \u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-03-23T23:48:20+08:00","sort_order":"best-selling","template_suffix":"network-cabling","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Network Cabling"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:40+08:00","alt":"Network Cabling","width":1300,"height":731,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-Cabling-8331.webp?v=1690554640"}},{"id":438345072930,"handle":"network-camera","title":"Network Camera","updated_at":"2023-09-04T20:49:41+08:00","body_html":"\u003cp\u003eToday’s organizations face an increasing number of security breaches—and the intensity of these threats is on the rise, too. People understand the reality that video surveillance plays in modern society.\u003c\/p\u003e\n\u003cp\u003eChoosing the right video surveillance system for your business can be challenging when you don’t know what to look for. From traditional local video surveillance to IP systems and cloud-based storage options, the experts at vnetwork can design, install, service and monitor the right video system for your needs.\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003c\/p\u003e","published_at":"2023-03-10T11:26:08+08:00","sort_order":"best-selling","template_suffix":"network-camera","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Network Camera"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:37+08:00","alt":"Network Camera","width":1280,"height":720,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-Camera-7618.png?v=1690554638"}},{"id":436686094626,"handle":"naas","title":"Network-As-A-Service (NaaS)","updated_at":"2023-07-28T22:30:36+08:00","body_html":"\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork delivers network infrastructure and management as a service, allowing organizations to leverage a robust and scalable network environment without the burden of hardware ownership and maintenance.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:04:55+08:00","sort_order":"best-selling","template_suffix":"naas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Network-As-A-Service (NaaS)"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:35+08:00","alt":"Network-As-A-Service (NaaS)","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Network-As-A-Service-NaaS-9615.png?v=1690554636"}},{"id":436612366626,"handle":"newbridge","title":"NewBridge","updated_at":"2023-10-03T05:50:52+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eNewbridge provides the most affordable and reliable enterprise level wireless solution for all businesses.\u003c\/span\u003e","published_at":"2023-02-18T08:44:11+08:00","sort_order":"best-selling","template_suffix":"newbridge","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"NewBridge"}],"published_scope":"web","image":{"created_at":"2023-07-28T22:30:32+08:00","alt":"NewBridge","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NewBridge-9681.png?v=1690732630"}},{"id":443039744290,"handle":"ngfw-end-point-security","title":"NGFW \u0026 EndPoint Security","updated_at":"2023-09-06T06:36:41+08:00","body_html":"\u003cp\u003e\u003cstrong\u003eAdvanced threat protection, from small businesses to global enterprises and cloud environments. Discover network security made boundless.\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eWhether you’re a small business or a large enterprise, whether in your home or in the cloud, SonicWall next-generation firewalls (NGFW) provide the security, control and visibility you need to maintain an effective cybersecurity posture. SonicWall’s award-winning hardware and advanced technology are built into each firewall to give you the edge on evolving threats. With solutions designed for networks of all sizes, SonicWall firewalls are designed to meet your specific security and usability needs, all at a cost that will protect your budget while securing your network.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-04-27T19:50:57+08:00","sort_order":"manual","template_suffix":"nextgen-firewall-endpoi","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"NextGen Firewall \u0026 End Point Security"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:01:40+08:00","alt":"NGFW \u0026 EndPoint Security - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NGFW-EndPoint-Security-V-Network-System-392.png?v=1690269244"}},{"id":444361146658,"handle":"nsa","title":"NSa Series Next-Generation Firewall (NGFW)","updated_at":"2023-10-03T20:49:50+08:00","body_html":"\u003cspan\u003eNext-gen security for mid-sized networks without the big-time price tag.\u003c\/span\u003e","published_at":"2023-05-12T10:12:09+08:00","sort_order":"best-selling","template_suffix":"nsa-series","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"NSa Series"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:59+08:00","alt":"NSa Series Next-Generation Firewall (NGFW) - V-Network System","width":1050,"height":593,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NSa-Series-Next-Generation-Firewall-NGFW-V-Network-System-182.png?v=1685592480"}},{"id":444361539874,"handle":"nssp","title":"NSsp Series Next-Generation Firewall (NGFW)","updated_at":"2023-10-02T05:00:02+08:00","body_html":"\u003cspan\u003eWorld-class intelligence. Cutting-edge security. Enterprise-sized networks.\u003c\/span\u003e","published_at":"2023-05-12T10:20:44+08:00","sort_order":"best-selling","template_suffix":"nssp","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"NSsp Series"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:08:01+08:00","alt":"NSsp Series Next-Generation Firewall (NGFW) - V-Network System","width":1050,"height":659,"src":"\/\/v-network.net\/cdn\/shop\/collections\/NSsp-Series-Next-Generation-Firewall-NGFW-V-Network-System-794.png?v=1685592482"}},{"id":439408689442,"handle":"one-touch-control","title":"One-Touch Control","updated_at":"2023-06-03T16:35:54+08:00","body_html":"","published_at":"2023-03-21T22:28:41+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"One-Touch Control"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:55+08:00","alt":"One-Touch Control - V-Network System","width":540,"height":540,"src":"\/\/v-network.net\/cdn\/shop\/collections\/One-Touch-Control-V-Network-System-426.webp?v=1685592476"}},{"id":452514480418,"handle":"pbx-as-a-service-pbxaas","title":"PBX-as-a-Service (PBXaaS)","updated_at":"2023-07-25T00:24:32+08:00","body_html":"\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\" data-mce-fragment=\"1\"\u003evnetwork offers cloud-based PBX solutions, enabling businesses to access advanced telephony features, call management, and voicemail services without the need for physical on-site infrastructure.\u003c\/span\u003e","published_at":"2023-07-25T00:24:31+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"PBXaaS"}],"published_scope":"web","image":{"created_at":"2023-07-25T00:24:30+08:00","alt":null,"width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/X-as-a-Services_1366_x_500_px_-2.png?v=1690215871"}},{"id":455323975970,"handle":"philips-professional-display-solutions","title":"Philips Professional Display Solutions","updated_at":"2023-08-18T00:13:19+08:00","body_html":"","published_at":"2023-08-18T00:11:42+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Philips"}],"published_scope":"web","image":{"created_at":"2023-08-18T00:13:18+08:00","alt":null,"width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/32.png?v=1692288799"}},{"id":439809638690,"handle":"poe-indicator","title":"PoE Indicator","updated_at":"2023-06-03T16:35:55+08:00","body_html":"Don't search - find!","published_at":"2023-03-25T14:59:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"PoE Indicator"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:57+08:00","alt":"PoE Indicator - V-Network System","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/PoE-Indicator-V-Network-System-505.jpg?v=1685592478"}},{"id":461456933154,"handle":"pre-order","title":"Pre-Order","updated_at":"2023-10-03T22:22:26+08:00","body_html":"","published_at":"2023-10-03T22:22:21+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"variant_price","relation":"greater_than","condition":"0"},{"column":"variant_inventory","relation":"equals","condition":"0"}],"published_scope":"web"},{"id":439809671458,"handle":"prime-odf","title":"PRIME ODF","updated_at":"2023-06-03T16:35:55+08:00","body_html":"The new generation of optical distribution systems.","published_at":"2023-03-25T15:00:34+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"PRIME ODF"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:14:03+08:00","alt":"PRIME ODF - V-Network System","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/PRIME-ODF-V-Network-System-471.jpg?v=1685592844"}},{"id":460898304290,"handle":"products-with-zero-amount","title":"Products with zero amount","updated_at":"2023-10-03T21:00:03+08:00","body_html":"","published_at":"2023-09-28T19:16:38+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"variant_price","relation":"equals","condition":"0"}],"published_scope":"web"},{"id":439809409314,"handle":"qr-connector-family","title":"QR Connector Family","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003eThe R\u0026amp;M QR connector family offers maximum packing density combined with convenient manipulation.\u003c\/p\u003e","published_at":"2023-03-25T14:55:02+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"QR Connector Family"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:14:01+08:00","alt":"QR Connector Family - V-Network System","width":768,"height":576,"src":"\/\/v-network.net\/cdn\/shop\/collections\/QR-Connector-Family-V-Network-System-727.jpg?v=1685592842"}},{"id":445760078114,"handle":"qualifiers","title":"Qualifiers","updated_at":"2023-08-29T22:22:38+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eCable qualification tools are used to troubleshoot and qualify cabling bandwidth and if existing cabling will support technology requirements like 100BASE-TX, 1000BASE-TX, 10GBASE-T, etc. \u003c\/span\u003e","published_at":"2023-05-23T15:40:03+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Qualifiers"}],"published_scope":"web"},{"id":436612235554,"handle":"r-m","title":"R\u0026M","updated_at":"2023-09-29T01:13:12+08:00","body_html":"\u003cp\u003e\u003cspan\u003eR\u0026amp;M (Reichle \u0026amp; De-Massari AG) is a leading Global cabling and connectivity solution provider for high end-communication networks since 1964. They serve a wide range of industries in the sectors of Local Area Networks, Data Centers and Public Networks.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eR\u0026amp;M covers the entire range of copper-based and fiber-optic connectivity.\u003c\/p\u003e\n\u003cp\u003eThe areas of application for R\u0026amp;M’s infrastructure solutions include:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFixed network, cellular phone networks, 5G and rail\u003c\/li\u003e\n\u003cli\u003eFiber to the Home and smart city\u003c\/li\u003e\n\u003cli\u003eCloud, colocation, edge data centers and Internet Exchange\u003c\/li\u003e\n\u003cli\u003eOffice, industry, smart buildings, Internet of Things\u003c\/li\u003e\n\u003cli\u003eSoftware for infrastructure management\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eClients who opt for R\u0026amp;M invest in sustainably reliable, scalable, and migration-capable infrastructures. The result: \u003cem\u003eNetworks with guaranteed, measurably superior performance\u003c\/em\u003e. The future of digital communication is secured.\u003c\/p\u003e","published_at":"2023-02-18T08:42:40+08:00","sort_order":"best-selling","template_suffix":"r-m","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"R\u0026M"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:13:59+08:00","alt":"R\u0026M - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/R-M-V-Network-System-344.png?v=1690253011"}},{"id":439662641442,"handle":"racking","title":"Racking","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003eCabinets with integrated vertical and horizontal cable management to provide enhanced handling and more space for airflow in your IT infrastructure.\u003c\/p\u003e","published_at":"2023-03-23T21:21:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":true,"rules":[{"column":"tag","relation":"equals","condition":"Blind Cover Click"},{"column":"tag","relation":"equals","condition":"Bracket"},{"column":"tag","relation":"equals","condition":"Modular Plinths"},{"column":"tag","relation":"equals","condition":"Network Cabinets"},{"column":"tag","relation":"equals","condition":"Server Cabinets"}],"published_scope":"web"},{"id":437797126434,"handle":"racking-intelligent-management","title":"Racking \u0026 Intelligent Management","updated_at":"2023-07-25T17:09:22+08:00","body_html":"\u003cspan\u003eCabinets with integrated vertical and horizontal cable management to provide enhanced handling and more space for airflow in your IT infrastructure. Best of breed OM4 and OM5 optical fiber, Cat 6A and Cat 8.1 twisted-pair, and SFP28 and QSFP28 AOC technology meet the bandwidth requirements of upcoming Ethernet applications.\u003c\/span\u003e","published_at":"2023-03-03T22:27:47+08:00","sort_order":"best-selling","template_suffix":"racking-intelligent-management","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Racking \u0026 Intelligent Management"}],"published_scope":"web","image":{"created_at":"2023-07-25T17:06:53+08:00","alt":null,"width":1200,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_1200_x_600_px_23fcc362-abcf-4475-ab24-90275761b387.webp?v=1690276014"}},{"id":443011203362,"handle":"raas","title":"Robotics-as-a Service (RaaS)","updated_at":"2023-07-25T00:10:42+08:00","body_html":"\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork offers robotic solutions on a subscription basis, providing businesses with access to automation and robotics technologies to enhance their operations and improve efficiency.\u003c\/span\u003e","published_at":"2023-04-27T12:53:04+08:00","sort_order":"best-selling","template_suffix":"raas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Robotic-as-a Services (RaaS)"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:19:43+08:00","alt":"Robotics-as-a Service (RaaS) - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Robotics-as-a-Service-RaaS-V-Network-System-208.png?v=1690215042"}},{"id":443461304610,"handle":"room-control-automation","title":"Room Control \u0026 Automation","updated_at":"2023-09-16T05:21:34+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003evnetwork brings you an array of hotel room automation products that aims at improving the stay experience of the guests. \u003c\/span\u003e\u003cbr\u003e","published_at":"2023-05-02T14:45:08+08:00","sort_order":"best-selling","template_suffix":"room-control-automation","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Room Control System"},{"column":"type","relation":"equals","condition":"Hospitality IPTV"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:19:45+08:00","alt":"Room Control \u0026 Automation - V-Network System","width":600,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Room-Control-Automation-V-Network-System-532.webp?v=1685593185"}},{"id":439836967202,"handle":"room-control-system","title":"Room Control System","updated_at":"2023-09-16T05:21:34+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eToday's luxury and full-service hotels must deliver engaging, personalised services to retain guest loyalty. Room Control System for Hotels ensure discerning guests enjoy connectivity and conveniences while driving efficiency with digitally integrated systems insight and management.\u003c\/span\u003e","published_at":"2023-03-26T00:37:34+08:00","sort_order":"best-selling","template_suffix":"room-control-system","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Room Control System"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:19:39+08:00","alt":"Room Control System - V-Network System","width":1200,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Room-Control-System-V-Network-System-836.jpg?v=1690278728"}},{"id":439408591138,"handle":"room-scheduling","title":"Room Scheduling","updated_at":"2023-07-25T16:59:54+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eA pillar of the Crestron Flex digital workplace platform, Crestron Flex Scheduling lets your workforce quickly book the right space with the right technology. All while helping you manage occupation density and providing utilization data for better real estate planning.\u003c\/span\u003e\u003cbr\u003e","published_at":"2023-03-21T22:28:07+08:00","sort_order":"best-selling","template_suffix":"room-scheduling","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Room Scheduling"}],"published_scope":"web","image":{"created_at":"2023-07-25T16:59:54+08:00","alt":null,"width":3000,"height":1721,"src":"\/\/v-network.net\/cdn\/shop\/collections\/image_f800818b-5707-49fe-96ef-e735f3a80aea.webp?v=1690275594"}},{"id":439805870370,"handle":"routing","title":"Routing","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003eSimplified and Secure High-Performance Routing\u003c\/p\u003e","published_at":"2023-03-25T13:05:31+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Routing"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:27:09+08:00","alt":"Routing - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Routing-V-Network-System-956.jpg?v=1685593630"}},{"id":443039777058,"handle":"secure-mobile-access","title":"Secure Mobile Access","updated_at":"2023-07-25T16:04:39+08:00","body_html":"\u003cp\u003e\u003cspan\u003eSecure your infrastructure while empowering your workforce. The Secure Mobile Access (SMA) series offers complete security for remote access to corporate resources hosted on-prem, in cloud and in hybrid datacenters.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eDeliver best-in-class secure access and minimize surface threats. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway that enables organizations to provide access to any application, anytime, from anywhere and any devices, including managed and unmanaged.\u003c\/p\u003e\n\u003cp\u003eSMA offers granular access control, context-aware device authorization, application-level VPN and complete integration with the most advanced authentications. SMA enables organizations to move to the cloud and embrace BYOD with ease.\u003c\/p\u003e","published_at":"2023-04-27T19:51:08+08:00","sort_order":"best-selling","template_suffix":"secure-mobile-access","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Secure Mobile Access"}],"published_scope":"web","image":{"created_at":"2023-07-25T16:04:38+08:00","alt":null,"width":600,"height":400,"src":"\/\/v-network.net\/cdn\/shop\/collections\/image_96e9a259-b932-433f-8d62-79400c7690ce.webp?v=1690272279"}},{"id":443039613218,"handle":"self-secure-networking","title":"Self-Secure Networking","updated_at":"2023-10-03T20:49:50+08:00","body_html":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDevoted itself to becoming a leader in implementing next generation security network, DPtech comes up with a brand new construction idea of Whitelist with management and control as the core, compared to the traditional Blacklist mechanism featuring interconnection as the core. Relying on years of deep understanding of user needs, DPtech builds a Self-Secure Network integrating Self-Secure Internet of Things, Self-Secure secure network, and Self-Secure data center by taking advantage of its products and solutions, thus making a critical change from network security to security network.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-04-27T19:50:34+08:00","sort_order":"manual","template_suffix":"self-secure-networking","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Self-Secure Networking"},{"column":"tag","relation":"equals","condition":"Self-Secure Networking"}],"published_scope":"web","image":{"created_at":"2023-07-25T14:54:43+08:00","alt":null,"width":1200,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_design-3_e6c48f8b-2cd3-4eb4-981f-e1baeef6257c.webp?v=1690268084"}},{"id":443206697250,"handle":"smbs-branches","title":"SMBs \u0026 Branches","updated_at":"2023-09-17T04:09:47+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eThe SonicWall TZ series of firewalls is designed specifically for the needs of SMBs and branch locations, delivering enterprise-class security without the enterprise-grade complexity.\u003c\/p\u003e\n\u003cp\u003eWith Zero-Touch Deployment and simplified centralized management, installation and operation is easy. Detect sophisticated threats, including encrypted attacks, with advanced networking and security features, like the multi-engine Capture Advanced Threat Protection (ATP) cloud-based sandbox service with patent-pending Real-Time Deep Memory Inspection (RTDMI™). With optional features like PoE\/PoE+ support and 802.11ac Wi-Fi, create a unified security solution for wired and wireless networks.\u003c\/p\u003e\n\u003cp\u003eSimply plug in and enjoy the advanced protection of the cost-effective SonicWall TZ series firewall without worrying about complex management — or the next threat.\u003c\/p\u003e","published_at":"2023-04-29T16:05:46+08:00","sort_order":"best-selling","template_suffix":"smbs-branches","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"SMBs \u0026 Branches"},{"column":"vendor","relation":"equals","condition":"SonicWall"}],"published_scope":"web"},{"id":436612399394,"handle":"softing","title":"Softing","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp class=\"rich-text__heading rte h1\"\u003e\u003cstrong\u003ePrevent unplanned network outages now\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv class=\"rich-text__text rte\"\u003e\n\u003cp\u003eYour reliable source for testing, qualifying and certifying cabling networks based on global technological standards.\u003c\/p\u003e\n\u003c\/div\u003e","published_at":"2023-02-18T08:44:42+08:00","sort_order":"best-selling","template_suffix":"softing","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Softing"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:07:53+08:00","alt":"Optimize! Softing - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Optimize-Softing-V-Network-System-297.png?v=1690252957"}},{"id":436612464930,"handle":"sonicwall","title":"Sonicwall","updated_at":"2023-10-03T20:49:50+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eWhether you’re a small business or a large enterprise, whether in your home or in the cloud, SonicWall next-generation firewalls (NGFW) provide the security, control and visibility you need to maintain an effective cybersecurity posture. \u003c\/span\u003e","published_at":"2023-02-18T08:45:05+08:00","sort_order":"best-selling","template_suffix":"sonicwall","disjunctive":true,"rules":[{"column":"vendor","relation":"equals","condition":"Sonicwall"},{"column":"vendor","relation":"equals","condition":"Distributor"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:27:07+08:00","alt":"Sonicwall - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Sonicwall-V-Network-System-236.png?v=1690253026"}},{"id":439408754978,"handle":"speakers-audio","title":"Speakers \u0026 Audio","updated_at":"2023-06-03T16:35:54+08:00","body_html":"","published_at":"2023-03-21T22:29:02+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Speakers \u0026 Audio"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:05+08:00","alt":"Speakers \u0026 Audio - V-Network System","width":900,"height":900,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Speakers-Audio-V-Network-System-236.webp?v=1685593925"}},{"id":439643570466,"handle":"structured-cabling-solutions","title":"Structured Cabling System","updated_at":"2023-08-29T22:22:50+08:00","body_html":"\u003cspan\u003eGive your network the flexible growth model it needs to enable digital connectivity, regardless of what applications and devices the future brings.\u003c\/span\u003e","published_at":"2023-03-23T16:51:16+08:00","sort_order":"best-selling","template_suffix":"structured-cabling-soluti","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Network Cabling"},{"column":"type","relation":"equals","condition":"Fibre Optic Cabling"},{"column":"type","relation":"equals","condition":"Racking \u0026 Intelligent Management"},{"column":"type","relation":"equals","condition":"Certifiers, Qualifiers and Verifiers"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:07+08:00","alt":"Structured Cabling System - V-Network System","width":946,"height":946,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Structured-Cabling-System-V-Network-System-954.webp?v=1685593927"}},{"id":439805837602,"handle":"switching","title":"Switching","updated_at":"2023-06-03T16:35:54+08:00","body_html":"\u003cp\u003e Increase Agility and Simplify Operations with Extreme’s Wired Access Portfolio\u003c\/p\u003e","published_at":"2023-03-25T13:04:42+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Switching"},{"column":"vendor","relation":"equals","condition":"Extreme Network"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:08+08:00","alt":"Switching - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Switching-V-Network-System-909.jpg?v=1685593929"}},{"id":437796995362,"handle":"twisted-pair-cabling","title":"Twisted Pair Cabling","updated_at":"2023-06-03T16:35:53+08:00","body_html":"","published_at":"2023-03-03T22:26:50+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Twisted Pair Cabling"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:03+08:00","alt":"Twisted Pair Cabling - V-Network System","width":350,"height":225,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Twisted-Pair-Cabling-V-Network-System-6.jpg?v=1685593923"}},{"id":444359999778,"handle":"tz","title":"TZ Series Next-Generation Firewall (NGFW)","updated_at":"2023-09-17T04:09:47+08:00","body_html":"\u003cp\u003e\u003cspan\u003eProtect your small business or branch location from intrusion, malware and ransomware with an easy-to-use, integrated security solution designed specifically for your needs. SonicWall TZ firewalls deliver enterprise-grade protection without the cost or complexity.\u003c\/span\u003e\u003c\/p\u003e\n\u003ch2 class=\"section-title\"\u003e\u003c\/h2\u003e\n\u003ch3 class=\"mb-3 section-title\"\u003e\u003c\/h3\u003e","published_at":"2023-05-12T09:51:01+08:00","sort_order":"best-selling","template_suffix":"tz-series","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"TZ Series"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:32:10+08:00","alt":"TZ Series Next-Generation Firewall (NGFW) - V-Network System","width":1050,"height":747,"src":"\/\/v-network.net\/cdn\/shop\/collections\/TZ-Series-Next-Generation-Firewall-NGFW-V-Network-System-618.png?v=1685593931"}},{"id":436571996450,"handle":"unified-communication-collaboration","title":"Unified Communication \u0026 Collaboration","updated_at":"2023-08-31T03:58:06+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003evnetwork's partnership with hybrid technology providers and hosted IP solutions provide us the ability to design and deploy a Unified Communication System\u003c\/span\u003e\u003cstrong data-mce-fragment=\"1\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/strong\u003e\u003cspan data-mce-fragment=\"1\"\u003ethat fits within our clients’ needs and budgets while also offering a robust variety of features such as unified communications (voicemail-to-email), instant messaging, and more.\u003c\/span\u003e\u003cbr\u003e\u003c\/p\u003e","published_at":"2023-02-17T20:34:28+08:00","sort_order":"best-selling","template_suffix":"unified-communication","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"IP Phone System"},{"column":"type","relation":"equals","condition":"Hybrid Phone System"},{"column":"type","relation":"equals","condition":"Contact Center"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:37+08:00","alt":"Unified Communication \u0026 Collaboration - V-Network System","width":1080,"height":1080,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Unified-Communication-Collaboration-V-Network-System-734.webp?v=1685594318"}},{"id":436686029090,"handle":"ucaas","title":"Unified Communications-As-A-Service (UCaaS)","updated_at":"2023-07-25T00:10:24+08:00","body_html":"\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork provides a suite of unified communication and collaboration tools delivered over the cloud, enabling organizations to streamline their communication channels and enhance collaboration across teams and locations.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:04:22+08:00","sort_order":"best-selling","template_suffix":"ucaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Unified Communications-As-A-Service (UCaaS)"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:43+08:00","alt":"Unified Communications-As-A-Service (UCaaS) - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Unified-Communications-As-A-Service-UCaaS-V-Network-System-981.png?v=1690215024"}},{"id":436612497698,"handle":"unv","title":"UNV","updated_at":"2023-09-28T21:58:00+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003eBased on advanced technologies, Uniview Smart Intrusion Prevention solutions provide highly visual system that includes detecting, alarming and recording. It’s a perfect solution to improve perimeter protection and achieve efficient management.\u003c\/p\u003e","published_at":"2023-02-18T08:45:30+08:00","sort_order":"manual","template_suffix":"uniview","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"Uniview"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:39+08:00","alt":"UNV - V-Network System","width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/UNV-V-Network-System-345.png?v=1690253043"}},{"id":445760143650,"handle":"verifiers","title":"Verifiers","updated_at":"2023-08-29T22:22:40+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eCable verification tools perform basic continuity functions such as wiremap and\/or length test. Verification tools are usually low-cost and simpler to use devices.\u003c\/span\u003e","published_at":"2023-05-23T15:40:17+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Verifiers"}],"published_scope":"web"},{"id":443051508002,"handle":"video-analytic-cloud-based-ai","title":"Video Analytic and Cloud-Base AI","updated_at":"2023-07-25T16:39:15+08:00","body_html":"\u003cp\u003eVideo Analytics uses advanced algorithms and machine learning to monitor, analyze and manage large volumes of video. They digitally analyze video inputs, transforming them into intelligent data, which helps in decision-making.\u003c\/p\u003e","published_at":"2023-04-27T22:47:25+08:00","sort_order":"best-selling","template_suffix":"video-analytic-manageme","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Video Analytic \u0026 Management"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:38:45+08:00","alt":"Video Analytic and Cloud-Base AI - V-Network System","width":442,"height":442,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Analytic-and-Cloud-Base-AI-V-Network-System-62.png?v=1685594326"}},{"id":439409574178,"handle":"video-conferencing","title":"Video Conferencing","updated_at":"2023-09-17T15:56:46+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cspan\u003eNo longer do companies have to subject their clients or employees to subpar interactions. With HD video streaming and clear, noise-reducing audio, the best video conferencing tech can transform your business operations by bringing an in-person experience to your digital meetings.\u003c\/span\u003e","published_at":"2023-03-21T22:34:13+08:00","sort_order":"best-selling","template_suffix":"video-conferencing","disjunctive":false,"rules":[{"column":"product_taxonomy_node_id","relation":"equals","condition":"1403"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:45:22+08:00","alt":"Video Conferencing - V-Network System","width":341,"height":341,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Conferencing-V-Network-System-504.jpg?v=1685594723"}},{"id":439431102754,"handle":"video-conferencing-hardware","title":"Video Conferencing Hardware","updated_at":"2023-09-17T15:56:46+08:00","body_html":"","published_at":"2023-03-22T01:27:55+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"product_taxonomy_node_id","relation":"equals","condition":"1403"}],"published_scope":"web"},{"id":443051442466,"handle":"video-management-storage","title":"Video Management and Storage","updated_at":"2023-09-07T18:17:07+08:00","body_html":"\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eVideo security helps keep locations safe through two primary methods. First, there is real-time surveillance that enables employees or law enforcement officials to discover and monitor any threat in the moment. Then there is the archival footage record that can be reviewed if a crime or other issue is uncovered or suspected at a later time. In both cases, the recorded footage needs to be securely deposited and maintained for future access — making Video Storage an essential element of every video camera security system.\u003c\/span\u003e","published_at":"2023-04-27T22:47:12+08:00","sort_order":"best-selling","template_suffix":"video-management-and-stor","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Video Storage"}],"published_scope":"web","image":{"created_at":"2023-07-25T16:35:23+08:00","alt":null,"width":1200,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_design-4_0ef28205-d19e-4fa3-8216-cd97a00e37ce.webp?v=1690274124"}},{"id":439462854946,"handle":"video-surveillance-analytic","title":"Video Surveillance \u0026 Analytic","updated_at":"2023-09-07T18:17:07+08:00","body_html":"\u003cspan\u003eFrom small deployments to large, complex infrastructures with thousands of cameras, vnetwork builds on years of experience in the industry to provide the highest-performing technology and solutions, at your budget.\u003c\/span\u003e","published_at":"2023-03-22T08:31:44+08:00","sort_order":"best-selling","template_suffix":"video-surveillance-analytic","disjunctive":true,"rules":[{"column":"type","relation":"equals","condition":"Video Analytic \u0026 Management"},{"column":"type","relation":"equals","condition":"Network Camera"},{"column":"type","relation":"equals","condition":"Video Storage"},{"column":"type","relation":"equals","condition":"Access Control \u0026 Integration"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:45:24+08:00","alt":"Video Surveillance \u0026 Analytic - V-Network System","width":500,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Surveillance-Analytic-V-Network-System-718.webp?v=1685594725"}},{"id":436685996322,"handle":"vsaas","title":"Video Surveillance-As-A-Service (VSaaS)","updated_at":"2023-07-25T00:11:01+08:00","body_html":"\u003cp\u003e\u003cspan class=\"WdYUQQ text-decoration-none text-strikethrough-none\"\u003evnetwork delivers video surveillance and analytics solutions as a service, allowing organizations to deploy and manage their security cameras, video storage, and analytics capabilities remotely.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-02-19T11:03:37+08:00","sort_order":"best-selling","template_suffix":"vsaas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Video Surveillance-As-A-Service"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:45:20+08:00","alt":"Video Surveillance-As-A-Service (VSaaS) - V-Network System","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Video-Surveillance-As-A-Service-VSaaS-V-Network-System-999.png?v=1690215061"}},{"id":439414358306,"handle":"video-walls","title":"Video Walls","updated_at":"2023-06-03T16:35:54+08:00","body_html":"","published_at":"2023-03-21T23:24:56+08:00","sort_order":"best-selling","template_suffix":"video-walls","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"Video Walls"}],"published_scope":"web"},{"id":437797093666,"handle":"vs-distribution-systems","title":"VS Distribution Systems","updated_at":"2023-06-03T16:35:53+08:00","body_html":"","published_at":"2023-03-03T22:27:34+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"VS Distribution Systems"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:53:09+08:00","alt":"VS Distribution Systems - V-Network System","width":350,"height":225,"src":"\/\/v-network.net\/cdn\/shop\/collections\/VS-Distribution-Systems-V-Network-System-689.jpg?v=1685595190"}},{"id":460888080674,"handle":"vshop","title":"vShop","updated_at":"2023-10-03T21:18:54+08:00","body_html":"","published_at":"2023-09-28T17:31:25+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"variant_price","relation":"greater_than","condition":"0"}],"published_scope":"web"},{"id":452941644066,"handle":"warehouse-sale","title":"Warehouse Sale","updated_at":"2023-10-03T17:16:20+08:00","body_html":"","published_at":"2023-07-28T09:32:38+08:00","sort_order":"manual","template_suffix":"","disjunctive":false,"rules":[{"column":"variant_compare_at_price","relation":"greater_than","condition":"0"}],"published_scope":"web"},{"id":445337927970,"handle":"wifi6e","title":"Wi-Fi 6E","updated_at":"2023-09-19T01:59:22+08:00","body_html":"\u003cmeta charset=\"utf-8\"\u003e\u003cmeta charset=\"utf-8\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eWi-Fi 6E is one variant of the 802.11ax standard. It uses 2.4 gigahertz, 5 GHz and, for the first time ever in the Wi-Fi realm, 6 GHz spectrum. As the latest generation of Wi-Fi, Wi-Fi 6E introduces several new features that result in faster speeds, lower latency, and higher-capacity individual cells and overall wireless local area network (WLAN) systems. And, as with earlier 802.11 variants, Wi-Fi 6E requires proper design and configuration to fully realize its benefits.\u003c\/span\u003e\u003cbr\u003e","published_at":"2023-05-19T22:20:51+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"Wi-Fi 6E"}],"published_scope":"web"},{"id":436686160162,"handle":"waas","title":"WiFi-As-A-Service (WaaS)","updated_at":"2023-10-03T01:13:32+08:00","body_html":"\u003cp\u003evnetwork provides scalable and secure WiFi solutions on a subscription basis, enabling businesses to offer reliable wireless connectivity to their employees, customers, or guests.\u003c\/p\u003e","published_at":"2023-02-19T11:05:54+08:00","sort_order":"best-selling","template_suffix":"waas","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"WiFi-As-A-Service (WaaS)"},{"column":"tag","relation":"equals","condition":"Access Point"},{"column":"tag","relation":"equals","condition":"Controller"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:53:07+08:00","alt":"WiFi-As-A-Service (WaaS) - vnetwork","width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/WiFi-As-A-Service-WaaS-V-Network-System-106.webp?v=1696266783"}},{"id":443039547682,"handle":"wireless","title":"Wireless","updated_at":"2023-10-03T05:29:26+08:00","body_html":"\u003cp\u003eBoost IT efficiency and deliver seamless user experiences with intelligent, cloud-driven wireless.\u003c\/p\u003e\n\u003cul role=\"list\" id=\"Slider-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7\" class=\"multicolumn-list contains-content-container grid grid--2-col-tablet-down grid--3-col-desktop slider slider--mobile grid--peek\"\u003e\n\u003cli data-cascade=\"\" class=\"multicolumn-list__item grid__item slider__slide scroll-trigger animate--slide-in\" id=\"Slide-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7-1\"\u003e\n\u003cdiv class=\"multicolumn-card content-container\"\u003e\n\u003cdiv class=\"multicolumn-card__info\"\u003e\n\u003ch3 class=\"inline-richtext\"\u003eAgile\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eThe latest enterprise-grade Wi-Fi 6E technology for both indoor and outdoor with software-selectable operating system, avoiding technology lock-in with the ability to re-deploy the same hardware for new uses cases.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/li\u003e\n\u003cli data-cascade=\"\" class=\"multicolumn-list__item grid__item slider__slide scroll-trigger animate--slide-in\" id=\"Slide-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7-2\"\u003e\n\u003cdiv class=\"multicolumn-card content-container\"\u003e\n\u003cdiv class=\"multicolumn-card__info\"\u003e\n\u003ch3 class=\"inline-richtext\"\u003eCloud Management\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eCombine the leading Wi-Fi hardware with next-generation Extreme cloud management to reduce risk and simplify operations for IT teams. Unify management of wired, wireless and SD-WAN devices via a single pane of glass. Flexible cloud-based, hybrid, or local management options to provide oversight and visibility.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/li\u003e\n\u003cli data-cascade=\"\" class=\"multicolumn-list__item grid__item slider__slide scroll-trigger animate--slide-in\" id=\"Slide-template--19988116406562__c44d82ca-700a-46dc-946a-7505d3cdbca7-3\"\u003e\n\u003cdiv class=\"multicolumn-card content-container\"\u003e\n\u003cdiv class=\"multicolumn-card__info\"\u003e\n\u003ch3 class=\"inline-richtext\"\u003eModern Digital Experience\u003c\/h3\u003e\n\u003cdiv class=\"rte\"\u003e\n\u003cp\u003eLeverage Explainable Machine Learning to enable a more proactive IT Operations team. Additional built-in security, location services, and IoT security to provide all the necessary components for a modern and connected experience to unlock business value.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e","published_at":"2023-04-27T19:49:59+08:00","sort_order":"best-selling","template_suffix":"wifi-access-point-and-con","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"WiFi Access Point and Controller"}],"published_scope":"web","image":{"created_at":"2023-07-25T14:14:52+08:00","alt":null,"width":1366,"height":600,"src":"\/\/v-network.net\/cdn\/shop\/collections\/2.png?v=1690269163"}},{"id":443046035746,"handle":"xaas","title":"X-as-a-Services™ (XaaS)","updated_at":"2023-08-07T14:11:55+08:00","body_html":"Shifting from traditional Capex-based to Subscription-based offerings involves cloud- based, a hybrid approach, or on- premises equipment.","published_at":"2023-04-27T21:32:25+08:00","sort_order":"best-selling","template_suffix":"xaas","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"X-as-a-Service"},{"column":"type","relation":"equals","condition":"XaaS"}],"published_scope":"web","image":{"created_at":"2023-06-12T14:16:05+08:00","alt":null,"width":1366,"height":768,"src":"\/\/v-network.net\/cdn\/shop\/collections\/Untitled_design-4_e32d1f8a-d730-4c5b-8e80-6186291ed125.png?v=1691388715"}},{"id":443679801634,"handle":"xprotect-extensions","title":"XProtect Extensions","updated_at":"2023-09-07T18:16:38+08:00","body_html":"\u003cp\u003e\u003cspan\u003eXProtect extensions are carefully designed software products installed on top of your XProtect VMS. Whether you operate within retail, transportation, or city surveillance, our extensions products are designed to address your industry's exact needs.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cmeta charset=\"UTF-8\"\u003eXProtect extensions are compatible with the Milestone Husky™ series. They are based on the XProtect VMS and access-control products that are installed.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2023-05-04T23:56:27+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"XProtect"},{"column":"tag","relation":"equals","condition":"Extensions"}],"published_scope":"web"},{"id":447235424546,"handle":"xprotect","title":"XProtect®","updated_at":"2023-09-07T18:16:35+08:00","body_html":"","published_at":"2023-06-06T19:26:18+08:00","sort_order":"created","template_suffix":"","disjunctive":false,"rules":[{"column":"tag","relation":"equals","condition":"XProtect"},{"column":"tag","relation":"equals","condition":"VMS"}],"published_scope":"web"},{"id":455325286690,"handle":"yottapath","title":"YottaPath","updated_at":"2023-08-18T00:25:36+08:00","body_html":"","published_at":"2023-08-18T00:25:35+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"vendor","relation":"equals","condition":"YottaPath"}],"published_scope":"web","image":{"created_at":"2023-08-18T00:25:34+08:00","alt":null,"width":1000,"height":500,"src":"\/\/v-network.net\/cdn\/shop\/collections\/31.png?v=1692289535"}},{"id":439809605922,"handle":"zoona-closure","title":"ZOONA Closure","updated_at":"2023-06-03T16:35:55+08:00","body_html":"For today's hybrid fibre optical access networks","published_at":"2023-03-25T14:59:35+08:00","sort_order":"best-selling","template_suffix":"","disjunctive":false,"rules":[{"column":"type","relation":"equals","condition":"ZOONA Closure"}],"published_scope":"web","image":{"created_at":"2023-06-01T12:59:16+08:00","alt":"ZOONA Closure - V-Network System","width":768,"height":512,"src":"\/\/v-network.net\/cdn\/shop\/collections\/ZOONA-Closure-V-Network-System-534.jpg?v=1685595557"}}]
[{"id":8254192353570,"title":"LSW3600-SE Self-Secure Switch","handle":"lsw3600-se-self-secure-switch","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eWith the rapid development of network informatization, information systems have become an indispensable infrastructure in people's daily lives. However, in the traditional network construction concept, the impact of abnormal intranet terminals and abnormal behavior on network efficiency is often neglected. Once an intranet security incident cannot be located and handled accurately, it is extremely difficult to retrospect afterwards. In response to the current situation of intranet security, DPtech has created the next-generation security switch by giving the network edge intelligent computing capabilities, so that the network equipment itself has immunity to virus propagation, network attacks, and hacker penetration. It also provides the functions of automatic policy deployment and loop self-check and self-healing, and provides network administrators with a visualization of the entire network security and simple desktop management methods for operation and maintenance.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eClientless authentication and non-sensing roaming\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eDPtech Self-Secure secure network Solution supports clientless authentication for internal terminals. After the successful authentication for the first time, the device can log to the intranet later with transparent authentication. The authentication information can be roamed throughout the network to realize easy access.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eTraffic control model combining blacklist and whitelist\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution provides intranet traffic shaping and control. A whitelist model is deployed for intranet lateral traffic, blocking all traffic and allowing only service traffic such as access to printer and sharing resource groups to pass through. In this way, it helps effectively control virus spreading in intranet. A blacklist model is deployed for intranet vertical traffic in order to manage and control DDoS and other attacks through defenses against behavior, service and threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eProgressive security policies deployed as needed\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution allows policy deployments of vertical traffic control at three levels: behavior, service and threat. Behavior policy is deployed to monitor all access users. Once illegal actions by a user are found, the Self-Secure switch will freeze the user. When the user passes authentication, the service policy will be linked to user identity, location, status and other information, making sure access to certain services is limited to users with certain permissions to avoid unauthorized access. In the meantime, special policies can be deployed to address deep threat and advanced attacks, realizing intensified protection for the intranet.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork-wide policy interaction to prevent any potential threat\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough interactions of DPtech Self-Secure switch, Self-Secure controller and Self-Secure management platform, network-wide policies can be dynamically distributed, and the access layer automatically can implement policies from the management platform to prevent any potential threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eIntranet user awareness and network-wide traceability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution is capable of intelligently detecting users and monitoring their online behaviors. It performs auditing and generates logs automatically of any abnormal behavior and access, helping administrators gain an overall understanding of intranet user behaviors.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSmooth evolution of the existing network\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure controller can be deployed online or side-by-side, realizing zero-modification expansion in the original network, and allowing clientless authentication and policy follow-up of users and devices within the network. DPtech Self-Secure Switch enables awareness of user behaviors, access location and other information. Through interactions with security policies, seamless security is thus made possible. The deployment of professional Network Security devices will facilitate the upgrade and transformation of network security construction by providing strong defense against deep threats and advanced attacks, and help users to smoothly evolve their networks and build a Self-Secure network that is safe, easy to manage, and visualized.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Controller\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eiNAC-Blade-A\/AI\/17A\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHighly reliable design\u003c\/td\u003e\n\u003ctd\u003eSupport key hardware redundancy of master control, power supplies and fans\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd\u003eSupport VSM virtualization and cloud boards\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess authentication\u003c\/td\u003e\n\u003ctd\u003eSupport Portal, IP, MAC, PPPOE, WeChat, SMS and other authentication modes\u003cbr\u003eSupport transparent authentication and authentication roaming\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess management\u003c\/td\u003e\n\u003ctd\u003eSupport permission management based on IP, user and user group\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTraffic control\u003c\/td\u003e\n\u003ctd\u003eSupport whitelisting for lateral traffic and blacklisting for vertical traffic\u003cbr\u003eSupport granular traffic control and traffic model analysis and learning\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAuditing of abnormal traffic\u003c\/td\u003e\n\u003ctd\u003eSupport alert and blocks based on unified auditing of traffic model and behavior models\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser traceability\u003c\/td\u003e\n\u003ctd\u003eNetwork-wide identity follow-up; support detection of access terminal, precise positioning of user location, and network-wide traceability of user behaviors\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAutomatic deployment\u003c\/td\u003e\n\u003ctd\u003eSupport Openflow1.3 protocol and network-wide automatic deployment\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Switch\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth class=\"td1\"\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e24GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e48GT4XGS-SE\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e222Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport static routing, RIPv1\/v2, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser awareness\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport precise identification of the type of access terminals and access locations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDevice protection\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eProtection against\u003cbr\u003eintranet attacks\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFan\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eFanless\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e2 pieces\u003c\/td\u003e\n\u003ctd\u003eFanless\u003c\/td\u003e\n\u003ctd\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePoE external power\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower\u003c\/td\u003e\n\u003ctd\u003e22W\u003c\/td\u003e\n\u003ctd\u003e34W\u003c\/td\u003e\n\u003ctd\u003e20W\u003c\/td\u003e\n\u003ctd\u003e30W\u003c\/td\u003e\n\u003ctd\u003e20.6W\u003c\/td\u003e\n\u003ctd\u003e39W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating Temperature\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e0°C~70°C\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e-10℃~55℃\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport real-time temperature detection and alarm;\u003cbr\u003eSupport SNMP, CLI, Web network management and unified management through Self-Secure management platform;\u003cbr\u003eSupport local and remote output of system logs, operation logs, debugging information;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cem\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/em\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0617\/20200617043016406.pdf\" target=\"_blank\"\u003eDPtech Self-Secure Switch Series - DATA SHEET\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-05-03T10:06:14+08:00","created_at":"2023-05-03T10:06:14+08:00","vendor":"DPtech","type":"Network Switches","tags":["Self-Secure Networking"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45074557403426,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW3600-SE Self-Secure Switch","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438","options":["Title"],"media":[{"alt":"DPtech LSW3600-SE Self-Secure Switch - vnetwork","id":34460653748514,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3600-SE-Self-Secure-Switch-2569.jpg?v=1695244438","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eWith the rapid development of network informatization, information systems have become an indispensable infrastructure in people's daily lives. However, in the traditional network construction concept, the impact of abnormal intranet terminals and abnormal behavior on network efficiency is often neglected. Once an intranet security incident cannot be located and handled accurately, it is extremely difficult to retrospect afterwards. In response to the current situation of intranet security, DPtech has created the next-generation security switch by giving the network edge intelligent computing capabilities, so that the network equipment itself has immunity to virus propagation, network attacks, and hacker penetration. It also provides the functions of automatic policy deployment and loop self-check and self-healing, and provides network administrators with a visualization of the entire network security and simple desktop management methods for operation and maintenance.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eClientless authentication and non-sensing roaming\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eDPtech Self-Secure secure network Solution supports clientless authentication for internal terminals. After the successful authentication for the first time, the device can log to the intranet later with transparent authentication. The authentication information can be roamed throughout the network to realize easy access.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eTraffic control model combining blacklist and whitelist\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution provides intranet traffic shaping and control. A whitelist model is deployed for intranet lateral traffic, blocking all traffic and allowing only service traffic such as access to printer and sharing resource groups to pass through. In this way, it helps effectively control virus spreading in intranet. A blacklist model is deployed for intranet vertical traffic in order to manage and control DDoS and other attacks through defenses against behavior, service and threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eProgressive security policies deployed as needed\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution allows policy deployments of vertical traffic control at three levels: behavior, service and threat. Behavior policy is deployed to monitor all access users. Once illegal actions by a user are found, the Self-Secure switch will freeze the user. When the user passes authentication, the service policy will be linked to user identity, location, status and other information, making sure access to certain services is limited to users with certain permissions to avoid unauthorized access. In the meantime, special policies can be deployed to address deep threat and advanced attacks, realizing intensified protection for the intranet.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNetwork-wide policy interaction to prevent any potential threat\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough interactions of DPtech Self-Secure switch, Self-Secure controller and Self-Secure management platform, network-wide policies can be dynamically distributed, and the access layer automatically can implement policies from the management platform to prevent any potential threat.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eIntranet user awareness and network-wide traceability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure secure network Solution is capable of intelligently detecting users and monitoring their online behaviors. It performs auditing and generates logs automatically of any abnormal behavior and access, helping administrators gain an overall understanding of intranet user behaviors.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSmooth evolution of the existing network\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe DPtech Self-Secure controller can be deployed online or side-by-side, realizing zero-modification expansion in the original network, and allowing clientless authentication and policy follow-up of users and devices within the network. DPtech Self-Secure Switch enables awareness of user behaviors, access location and other information. Through interactions with security policies, seamless security is thus made possible. The deployment of professional Network Security devices will facilitate the upgrade and transformation of network security construction by providing strong defense against deep threats and advanced attacks, and help users to smoothly evolve their networks and build a Self-Secure network that is safe, easy to manage, and visualized.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eSPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Controller\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eiNAC-Blade-A\/AI\/17A\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHighly reliable design\u003c\/td\u003e\n\u003ctd\u003eSupport key hardware redundancy of master control, power supplies and fans\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd\u003eSupport VSM virtualization and cloud boards\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess authentication\u003c\/td\u003e\n\u003ctd\u003eSupport Portal, IP, MAC, PPPOE, WeChat, SMS and other authentication modes\u003cbr\u003eSupport transparent authentication and authentication roaming\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAccess management\u003c\/td\u003e\n\u003ctd\u003eSupport permission management based on IP, user and user group\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTraffic control\u003c\/td\u003e\n\u003ctd\u003eSupport whitelisting for lateral traffic and blacklisting for vertical traffic\u003cbr\u003eSupport granular traffic control and traffic model analysis and learning\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAuditing of abnormal traffic\u003c\/td\u003e\n\u003ctd\u003eSupport alert and blocks based on unified auditing of traffic model and behavior models\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser traceability\u003c\/td\u003e\n\u003ctd\u003eNetwork-wide identity follow-up; support detection of access terminal, precise positioning of user location, and network-wide traceability of user behaviors\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eAutomatic deployment\u003c\/td\u003e\n\u003ctd\u003eSupport Openflow1.3 protocol and network-wide automatic deployment\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eFunction Descriptions of DPtech Self-Secure Switch\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth class=\"td1\"\u003eProduct Model\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e24GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3600-\u003cbr\u003e48GT4GP-PWR-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e24GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW3620-\u003cbr\u003e48GT4XGS-SE\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 Gigabit SFP\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45 +4 10-Gigabit SFP+\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\u003cbr\u003e\/5.98Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e216Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003ctd\u003e222Mpps\u003c\/td\u003e\n\u003ctd\u003e252Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport static routing, RIPv1\/v2, OSPF\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser awareness\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport precise identification of the type of access terminals and access locations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDevice protection\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eProtection against\u003cbr\u003eintranet attacks\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFan\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eFanless\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e2 pieces\u003c\/td\u003e\n\u003ctd\u003eFanless\u003c\/td\u003e\n\u003ctd\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePoE external power\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003eAC input 370W\u003cbr\u003eDC input 740W\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003ctd\u003e-\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower\u003c\/td\u003e\n\u003ctd\u003e22W\u003c\/td\u003e\n\u003ctd\u003e34W\u003c\/td\u003e\n\u003ctd\u003e20W\u003c\/td\u003e\n\u003ctd\u003e30W\u003c\/td\u003e\n\u003ctd\u003e20.6W\u003c\/td\u003e\n\u003ctd\u003e39W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating Temperature\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e0°C~70°C\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e-10℃~55℃\u003cbr\u003e6KV interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"7\"\u003eSupport real-time temperature detection and alarm;\u003cbr\u003eSupport SNMP, CLI, Web network management and unified management through Self-Secure management platform;\u003cbr\u003eSupport local and remote output of system logs, operation logs, debugging information;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cem\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/em\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0617\/20200617043016406.pdf\" target=\"_blank\"\u003eDPtech Self-Secure Switch Series - DATA SHEET\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8247856890146,"title":"LSW3620 Series","handle":"lsw3620-series","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eAs the next generation high performance 10-Gigabit Ethernet switches independently developed by DPtech, the LSW3620 Series provides high density Gigabit access and non-convergent 10 Gigabit uplink capabilities. Based on the industry’s leading high performance hardware architecture and DPtech’s ConPlat operating system, its features include sound layer 2 and 3 processing capabilities, enhanced access security and access control policy, VSM (Virtual Switching Matrix) N:1 VEM (Virtual Extension Matrix), vertical virtualization, low power consumption, and fanless quiet design. It is ideal for building the next generation Self-Secure, energy-efficient, and virtual secure networks.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh density Gigabit access and 10-Gigabit uplink\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith 24\/48 high density 100M or Gigabit interfaces and 4 reinforced 10-Gigabit uplink interfaces, the LSW3620 Series enables convergence-free interconnection and meet the high performance and no congestion requirements for large secure networks.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVirtual Switching Matrix (VSM)\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW3620 Series adopts Virtual Switching Matrix (VSM) technology, which performs virtualization of multiple physical devices into a single logical device for unified configuration and management. \u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull support of IPV4\/IPv6 dual stack\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the leading ConPlat operating system, the LSW3620 Series supports IPV4\/IPv6 dual stack, in addition to static routing, RIP, OSPF routing protocols of IPV4\/IPv6. It can be flexibly deployed on a network with only IPv4 or IPv6, or with both IPv4 and IPv6, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security control\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eLSW3620 Series provides multiple authentication modes based on MAC address, 802.1x, and Portal, capable of meeting the authentication requirements for printers, mobile terminals, and desktop PCs. With a built-in authentication server, it also supports large-capacity local access authentication.\u003cbr\u003e\u003cbr\u003eIt supports dynamic or static binding of user identity, such as user account, IP, MAC, VLAN, and interface. It enables dynamic ACL distribution policy based on VLAN, which simplifies user configuration. The LSW3620 Series is provided with enhanced ACL rules by supporting large-capacity ingress and egress ACLs.\u003cbr\u003e\u003cbr\u003eTo address ARP attacks and ARP viruses, the primary threat of LAN security, the LSW3620 Series provides sound ARP protection by supporting ARP Detection, one-click ARP binding, authorized ARP, ARP source suppression, and ARP source address inspection, thus guarding against all APR attacks thoroughly.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eEnergy-efficient quiet design\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith industry-leading energy-saving chips and compatibility with IEEE 802.3az EEE (Energy Efficient Ethernet) technology, the LSW3620-24GT4XGS enables automatic adjustment of energy usage according to network connection utilization. For idle Ethernet ports, the energy consumption at both ends will be reduced. When data transmission is started, normal power supply will be resumed. In this way, it realizes intelligent adjustment of power supply requirements.\u003cbr\u003e\u003cbr\u003eAs the industry’s only 10-Gigabit fanless switch, the LSW3620-24GT4XGS adopts a fanless quiet design, which not only minimizes noise in environments, but also improves the device reliability by avoiding single-point failure caused by fans.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW3620-24GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW3620-48GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45+4 10-Gigabit SFP+\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45+4 10-Gigabit SFP+\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e336Gbps\/3.36Tbps\u003c\/td\u003e\n\u003ctd\u003e336Gbps\/3.36Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e108Mpps\/268Mpps\u003c\/td\u003e\n\u003ctd\u003e144Mpps\/268Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e2.4kg\u003c\/td\u003e\n\u003ctd\u003e3.7kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003e54W (AC 110~220V)\u003c\/td\u003e\n\u003ctd\u003e54W (AC 110~220V)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHost power consumption\u003c\/td\u003e\n\u003ctd\u003eStatic: 14.4W Full load: 20.6W\u003c\/td\u003e\n\u003ctd\u003eStatic: 27.5W Full load: 39W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd\u003e-10℃~55℃, interface lightning protection\u003c\/td\u003e\n\u003ctd\u003e-10℃~55℃, interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFan\u003c\/td\u003e\n\u003ctd\u003eFanless\u003c\/td\u003e\n\u003ctd\u003ewith fan\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMAC\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport static, dynamic, black hole MAC entries Support source MAC address filtering\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVLAN\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport 4K 802.1Q VLAN\u003cbr\u003eSupport VLAN based on MAC\/ IP subnet\/authentication policy\/interface VLAN\u003cbr\u003eSupport Voice VLAN\u003cbr\u003eSupport QinQ\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePort features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport port aggregation, port mirroring, RSPAN, port isolation, port traffic identification\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSpanning tree\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport STP, RSTP, MSTP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDHCP\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport DHCP Client, DHCP Relay, DHCP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple physical devices into a single logical device\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport static routing, RIPv1\/2, OSPF\u003cbr\u003eSupport RIPng, OSPFv3 Support policy-go-together\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport IGMP Snooping, IGMP Proxy, GMRP\u003cbr\u003eSupport PIM-SM\/PIM-SSM\/PIM-DM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eACL\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport ACL rules based on VLAN, MAC address, IP address, TCP\/UDP port number\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eQoS\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport 8 priority queues per port Support traffic classification based on 802.1p\/DSCP\/TOS Support speed limit on ports and streams Support SP, WRR, SP + WRR queue scheduling\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport local and centralized authentication based on MAC address\u003cbr\u003eSupport local and centralized authentication based on 802.1x\u003cbr\u003eSupport local and centralized authentication based on Portal\u003cbr\u003eSupport dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection\u003cbr\u003eSupport port isolation, port security\u003cbr\u003eSupport broadcast storm suppression\u003cbr\u003eSupport SSH2.0\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport MON\u003cbr\u003eSupport IEEE 1588v2 PTP\u003cbr\u003eSupport real-time temperature detection and alarm\u003cbr\u003eSupport SNMP, CLI, Web management, and Unified Management Center (UMC)\u003cbr\u003eSupport local and remote output of system logs, operation logs, debugging information\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T20:38:58+08:00","created_at":"2023-04-27T20:38:58+08:00","vendor":"DPtech","type":"Network Switches","tags":["Self-Secure Networking"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45046702997794,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW3620 Series","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3620-Series-1870.jpg?v=1695244407"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3620-Series-1870.jpg?v=1695244407","options":["Title"],"media":[{"alt":"DPtech LSW3620 Series - vnetwork","id":34460692087074,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3620-Series-1870.jpg?v=1695244407"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW3620-Series-1870.jpg?v=1695244407","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eAs the next generation high performance 10-Gigabit Ethernet switches independently developed by DPtech, the LSW3620 Series provides high density Gigabit access and non-convergent 10 Gigabit uplink capabilities. Based on the industry’s leading high performance hardware architecture and DPtech’s ConPlat operating system, its features include sound layer 2 and 3 processing capabilities, enhanced access security and access control policy, VSM (Virtual Switching Matrix) N:1 VEM (Virtual Extension Matrix), vertical virtualization, low power consumption, and fanless quiet design. It is ideal for building the next generation Self-Secure, energy-efficient, and virtual secure networks.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh density Gigabit access and 10-Gigabit uplink\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith 24\/48 high density 100M or Gigabit interfaces and 4 reinforced 10-Gigabit uplink interfaces, the LSW3620 Series enables convergence-free interconnection and meet the high performance and no congestion requirements for large secure networks.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVirtual Switching Matrix (VSM)\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW3620 Series adopts Virtual Switching Matrix (VSM) technology, which performs virtualization of multiple physical devices into a single logical device for unified configuration and management. \u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull support of IPV4\/IPv6 dual stack\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the leading ConPlat operating system, the LSW3620 Series supports IPV4\/IPv6 dual stack, in addition to static routing, RIP, OSPF routing protocols of IPV4\/IPv6. It can be flexibly deployed on a network with only IPv4 or IPv6, or with both IPv4 and IPv6, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security control\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eLSW3620 Series provides multiple authentication modes based on MAC address, 802.1x, and Portal, capable of meeting the authentication requirements for printers, mobile terminals, and desktop PCs. With a built-in authentication server, it also supports large-capacity local access authentication.\u003cbr\u003e\u003cbr\u003eIt supports dynamic or static binding of user identity, such as user account, IP, MAC, VLAN, and interface. It enables dynamic ACL distribution policy based on VLAN, which simplifies user configuration. The LSW3620 Series is provided with enhanced ACL rules by supporting large-capacity ingress and egress ACLs.\u003cbr\u003e\u003cbr\u003eTo address ARP attacks and ARP viruses, the primary threat of LAN security, the LSW3620 Series provides sound ARP protection by supporting ARP Detection, one-click ARP binding, authorized ARP, ARP source suppression, and ARP source address inspection, thus guarding against all APR attacks thoroughly.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eEnergy-efficient quiet design\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith industry-leading energy-saving chips and compatibility with IEEE 802.3az EEE (Energy Efficient Ethernet) technology, the LSW3620-24GT4XGS enables automatic adjustment of energy usage according to network connection utilization. For idle Ethernet ports, the energy consumption at both ends will be reduced. When data transmission is started, normal power supply will be resumed. In this way, it realizes intelligent adjustment of power supply requirements.\u003cbr\u003e\u003cbr\u003eAs the industry’s only 10-Gigabit fanless switch, the LSW3620-24GT4XGS adopts a fanless quiet design, which not only minimizes noise in environments, but also improves the device reliability by avoiding single-point failure caused by fans.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW3620-24GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW3620-48GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e24 Gigabit RJ45+4 10-Gigabit SFP+\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit RJ45+4 10-Gigabit SFP+\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e336Gbps\/3.36Tbps\u003c\/td\u003e\n\u003ctd\u003e336Gbps\/3.36Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e108Mpps\/268Mpps\u003c\/td\u003e\n\u003ctd\u003e144Mpps\/268Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e2.4kg\u003c\/td\u003e\n\u003ctd\u003e3.7kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003e54W (AC 110~220V)\u003c\/td\u003e\n\u003ctd\u003e54W (AC 110~220V)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHost power consumption\u003c\/td\u003e\n\u003ctd\u003eStatic: 14.4W Full load: 20.6W\u003c\/td\u003e\n\u003ctd\u003eStatic: 27.5W Full load: 39W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd\u003e-10℃~55℃, interface lightning protection\u003c\/td\u003e\n\u003ctd\u003e-10℃~55℃, interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eFan\u003c\/td\u003e\n\u003ctd\u003eFanless\u003c\/td\u003e\n\u003ctd\u003ewith fan\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMAC\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport static, dynamic, black hole MAC entries Support source MAC address filtering\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVLAN\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport 4K 802.1Q VLAN\u003cbr\u003eSupport VLAN based on MAC\/ IP subnet\/authentication policy\/interface VLAN\u003cbr\u003eSupport Voice VLAN\u003cbr\u003eSupport QinQ\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePort features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport port aggregation, port mirroring, RSPAN, port isolation, port traffic identification\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSpanning tree\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport STP, RSTP, MSTP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDHCP\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport DHCP Client, DHCP Relay, DHCP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple physical devices into a single logical device\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport static routing, RIPv1\/2, OSPF\u003cbr\u003eSupport RIPng, OSPFv3 Support policy-go-together\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport IGMP Snooping, IGMP Proxy, GMRP\u003cbr\u003eSupport PIM-SM\/PIM-SSM\/PIM-DM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eACL\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport ACL rules based on VLAN, MAC address, IP address, TCP\/UDP port number\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eQoS\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport 8 priority queues per port Support traffic classification based on 802.1p\/DSCP\/TOS Support speed limit on ports and streams Support SP, WRR, SP + WRR queue scheduling\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport local and centralized authentication based on MAC address\u003cbr\u003eSupport local and centralized authentication based on 802.1x\u003cbr\u003eSupport local and centralized authentication based on Portal\u003cbr\u003eSupport dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection\u003cbr\u003eSupport port isolation, port security\u003cbr\u003eSupport broadcast storm suppression\u003cbr\u003eSupport SSH2.0\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport MON\u003cbr\u003eSupport IEEE 1588v2 PTP\u003cbr\u003eSupport real-time temperature detection and alarm\u003cbr\u003eSupport SNMP, CLI, Web management, and Unified Management Center (UMC)\u003cbr\u003eSupport local and remote output of system logs, operation logs, debugging information\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003eThese specifications apply only to DPtech products available on the international market.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8247856562466,"title":"LSW5662 Series","handle":"lsw5662-series","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eTraditional intranet is a shared network, with no access control on terminals or mutual access among terminals. This vulnerability can be easily exploited by hackers to spread viruses and attacks. In case of intranet security incidents, it is impossible to locate and control the source of attack in the first place and extremely difficult to trace back. DPtech LSW5662-SE Series Self-Secure switches provide the network with security protection and exception disposal capabilities by taking advantage of intelligent computing technology. The built-in behavior model and baseline detection provides the Self-Secure switches with immunity to virus transmission, network attacks, and hacker penetration. With automatic policy deployment, self inspection and recovery of ring networks, and baseline detection, it can further extend its security protection to intranet, realizing threat suppression of key nodes of network, operation and maintenance of the entire network, and simplified network management.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh performance port density scalability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith four 10-Gigabit optical interfaces and flexibly scalable Gigabit interfaces, the LSW5662 Series is a full wire-speed interconnection solution with the highest cost-effectiveness.\u003cbr\u003eIt supports a wide array of high performance expansion boards, including 40G expansion boards, 10G optical\/electrical expansion boards, and flexible Gigabit optical\/electrical expansion boards\u003cspan\u003e, \u003c\/span\u003eit provides high performance scalability to meet the diverse networking needs of large-scale network convergence or small-scale network cores.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eEnhanced environmental adaptability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series adopts an environment-enhanced design, which provides features such as a wide range of operating temperature (i.e., 0~70℃) and pressure, and lightning protection. This helps ensure highly reliable operation in complex electrical environments (e.g., corridor equipment room) and air-conditioning free deployment environments.\u003cbr\u003e A number of statuses and alarms can be provided, including environmental alarms, power supply and fan alarms, interface, and CPU status.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGuaranteed high reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCompatible with fast ring network recovery protocol (FRRP) and fast link recovery protocol (FLRP), the LSW5662 Series provides a self-recovery performance of less than 20 milliseconds. Multiple services and heavy traffic will have no impact on convergence time, thus ensuring the normal business operation.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVirtual Switching Matrix (VSM)\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series adopts Virtual Switching Matrix (VSM) technology, which performs virtualization of multiple physical devices into a single logical device for unified configuration and management. \u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security control policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series provides multiple centralized authentication modes based on MAC address, 802.1x, and Portal. With a built-in authentication server, it supports local access authentication for 1K users. It supports dynamic or static binding of user identity, such as user account, IP, MAC, VLAN, and interface. Dynamic distribution of policies is supported.\u003cbr\u003eThe LSW5662 Series is provided with enhanced ACL by supporting large-capacity ingress and egress ACLs. It also enables ACL distribution based on VLAN, which simplifies user configuration and avoids waste of ACL resources.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich QoS policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series supports L2~L4 packet filtering and traffic detection on ports. It provides multiple stream classifications based on source MAC address, destination MAC address, source IP address, destination IP address, TCP\/UDP port number, protocol type, and VLAN. With priority queues based on hardware, it is compatible with multiple queue scheduling algorithms such as SP, WRR, and SP+WPP. Support congestion management and rate limits on interfaces.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull support of IPV4\/IPv6 dual stack\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series supports IPv4\/IPv6 dual stack and IPv6 over IPv4 Tunnel (including manual Tunnel, 6to4 Tunnel, ISATAP Tunnel) as well as IPv6 layer 3 wire-speed forwarding. It can be flexibly deployed on a network with only IPv4 or IPv6, or with both IPv4 and IPv6, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Name\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-28GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-48GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-24GP4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-48GP4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e20 Gigabit electrical interfaces + 8 Gigabit Combo + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit electrical interfaces + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e16 Gigabit optical interfaces (SFP) + 8 Gigabit Combo + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit optical interfaces (SFP) + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement interfaces\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e1 RJ-45 port, 1 RJ-45 Console port, 1 USB port, 1 Mini USB Console port\u003c\/td\u003e\n\u003ctd\u003e1 RJ-45 Console port\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e342Mpps\/450Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\/485Mpps\u003c\/td\u003e\n\u003ctd\u003e342Mpps\/450Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\/485Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eExpansion Slots\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eInterface Module\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e2-port 40G optical interface module (QSFP), 1-port 40G optical interface module (QSFP), 8-port 10-Gigabit optical interface module (SFP+), 8-port 10-Gigabit Ethernet interface module, 4-port 10-Gigabit optical interface module (SFP+), 2-port 10-Gigabit optical interface module (SFP+), 8-port Gigabit optical interface module (SFP), 8-port Gigabit electrical interface module, 4-port Gigabit optical interface module (SFP) + 4-port Gigabit electrical interface module\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width * depth * height: mm)\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply Support AC\/DC\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply\u003cbr\u003eSupport AC\/DC\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply\u003cbr\u003eSupport AC\/DC\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply\u003cbr\u003eSupport AC\/DC\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e70W\u003c\/td\u003e\n\u003ctd\u003e61W\u003c\/td\u003e\n\u003ctd\u003e90W\u003c\/td\u003e\n\u003ctd\u003e108W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e0℃~70℃, interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVXLAN\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport VXLAN layer 2 switching Support VXLAN routing Support VXLAN gateway Support VxLAN centralized console of OpenFlow+Netconf\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMAC\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport 96K MAC entries Support static MAC, dynamic MAC, black hole MAC and source MAC address filtering\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e VLAN\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport 4K VLAN Support VLAN based on MAC\/ IP subnet\/authentication policy\/interface VLAN Support Voice VLAN Support QinQ\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePort features\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport port aggregation, port mirroring, port isolation, port traffic identification, RSPAN\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSpanning tree\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport STP, RSTP, MSTP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDHCP\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eupport DHCP Client, DHCP Relay, DHCP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport VSM virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport static routing Support RIPv1\/v2, OSPF, BGP, VRRP Support RIPng, OSPFv3, BGP4+ for IPv6, and VRRPv3 Support policy-go-together\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport IGMP Snooping and IGMP Proxy Support GMRP Support PIM-SM, PIM-SSM, PIM-DM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eACL\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport ACL rules based on VLAN, MAC address, IP address, TCP\/UDP port number\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eQoS\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport 8 priority queues per port Support traffic classification based on 802.1p\/DSCP\/TOS Support speed limit on ports and streams Support SP, WRR, SP + WRR queue scheduling\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport local and centralized authentication based on MAC address Support local and centralized authentication based on 802.1x Support local and centralized authentication based on Portal Support dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection Support port isolation, port security Support broadcast storm suppression Support SSH2.0\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport MON Support NTP Support real-time temperature detection and alarm Support SNMP, CLI, Web management, and Unified Management Center (UMC) Support local and remote output of system logs, operation logs, debugging information\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T20:37:17+08:00","created_at":"2023-04-27T20:37:17+08:00","vendor":"DPtech","type":"Network Switches","tags":["Self-Secure Networking"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45046699262242,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW5662 Series","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-Series-1632.jpg?v=1695244424"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-Series-1632.jpg?v=1695244424","options":["Title"],"media":[{"alt":"DPtech LSW5662 Series - vnetwork","id":34460692021538,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-Series-1632.jpg?v=1695244424"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-Series-1632.jpg?v=1695244424","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eTraditional intranet is a shared network, with no access control on terminals or mutual access among terminals. This vulnerability can be easily exploited by hackers to spread viruses and attacks. In case of intranet security incidents, it is impossible to locate and control the source of attack in the first place and extremely difficult to trace back. DPtech LSW5662-SE Series Self-Secure switches provide the network with security protection and exception disposal capabilities by taking advantage of intelligent computing technology. The built-in behavior model and baseline detection provides the Self-Secure switches with immunity to virus transmission, network attacks, and hacker penetration. With automatic policy deployment, self inspection and recovery of ring networks, and baseline detection, it can further extend its security protection to intranet, realizing threat suppression of key nodes of network, operation and maintenance of the entire network, and simplified network management.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh performance port density scalability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith four 10-Gigabit optical interfaces and flexibly scalable Gigabit interfaces, the LSW5662 Series is a full wire-speed interconnection solution with the highest cost-effectiveness.\u003cbr\u003eIt supports a wide array of high performance expansion boards, including 40G expansion boards, 10G optical\/electrical expansion boards, and flexible Gigabit optical\/electrical expansion boards\u003cspan\u003e, \u003c\/span\u003eit provides high performance scalability to meet the diverse networking needs of large-scale network convergence or small-scale network cores.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eEnhanced environmental adaptability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series adopts an environment-enhanced design, which provides features such as a wide range of operating temperature (i.e., 0~70℃) and pressure, and lightning protection. This helps ensure highly reliable operation in complex electrical environments (e.g., corridor equipment room) and air-conditioning free deployment environments.\u003cbr\u003e A number of statuses and alarms can be provided, including environmental alarms, power supply and fan alarms, interface, and CPU status.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGuaranteed high reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCompatible with fast ring network recovery protocol (FRRP) and fast link recovery protocol (FLRP), the LSW5662 Series provides a self-recovery performance of less than 20 milliseconds. Multiple services and heavy traffic will have no impact on convergence time, thus ensuring the normal business operation.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVirtual Switching Matrix (VSM)\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series adopts Virtual Switching Matrix (VSM) technology, which performs virtualization of multiple physical devices into a single logical device for unified configuration and management. \u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security control policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series provides multiple centralized authentication modes based on MAC address, 802.1x, and Portal. With a built-in authentication server, it supports local access authentication for 1K users. It supports dynamic or static binding of user identity, such as user account, IP, MAC, VLAN, and interface. Dynamic distribution of policies is supported.\u003cbr\u003eThe LSW5662 Series is provided with enhanced ACL by supporting large-capacity ingress and egress ACLs. It also enables ACL distribution based on VLAN, which simplifies user configuration and avoids waste of ACL resources.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich QoS policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series supports L2~L4 packet filtering and traffic detection on ports. It provides multiple stream classifications based on source MAC address, destination MAC address, source IP address, destination IP address, TCP\/UDP port number, protocol type, and VLAN. With priority queues based on hardware, it is compatible with multiple queue scheduling algorithms such as SP, WRR, and SP+WPP. Support congestion management and rate limits on interfaces.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull support of IPV4\/IPv6 dual stack\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW5662 Series supports IPv4\/IPv6 dual stack and IPv6 over IPv4 Tunnel (including manual Tunnel, 6to4 Tunnel, ISATAP Tunnel) as well as IPv6 layer 3 wire-speed forwarding. It can be flexibly deployed on a network with only IPv4 or IPv6, or with both IPv4 and IPv6, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Name\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-28GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-48GT4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-24GP4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW5662-48GP4XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e20 Gigabit electrical interfaces + 8 Gigabit Combo + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit electrical interfaces + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e16 Gigabit optical interfaces (SFP) + 8 Gigabit Combo + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit optical interfaces (SFP) + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement interfaces\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e1 RJ-45 port, 1 RJ-45 Console port, 1 USB port, 1 Mini USB Console port\u003c\/td\u003e\n\u003ctd\u003e1 RJ-45 Console port\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003ctd\u003e598Gbps\/5.98Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e342Mpps\/450Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\/485Mpps\u003c\/td\u003e\n\u003ctd\u003e342Mpps\/450Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\/485Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eExpansion Slots\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eInterface Module\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e2-port 40G optical interface module (QSFP), 1-port 40G optical interface module (QSFP), 8-port 10-Gigabit optical interface module (SFP+), 8-port 10-Gigabit Ethernet interface module, 4-port 10-Gigabit optical interface module (SFP+), 2-port 10-Gigabit optical interface module (SFP+), 8-port Gigabit optical interface module (SFP), 8-port Gigabit electrical interface module, 4-port Gigabit optical interface module (SFP) + 4-port Gigabit electrical interface module\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width * depth * height: mm)\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003ctd\u003e440×400×44\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply Support AC\/DC\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply\u003cbr\u003eSupport AC\/DC\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply\u003cbr\u003eSupport AC\/DC\u003c\/td\u003e\n\u003ctd\u003ehot-plug, modular dual power supply\u003cbr\u003eSupport AC\/DC\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e70W\u003c\/td\u003e\n\u003ctd\u003e61W\u003c\/td\u003e\n\u003ctd\u003e90W\u003c\/td\u003e\n\u003ctd\u003e108W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e0℃~70℃, interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVXLAN\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport VXLAN layer 2 switching Support VXLAN routing Support VXLAN gateway Support VxLAN centralized console of OpenFlow+Netconf\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMAC\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport 96K MAC entries Support static MAC, dynamic MAC, black hole MAC and source MAC address filtering\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e VLAN\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport 4K VLAN Support VLAN based on MAC\/ IP subnet\/authentication policy\/interface VLAN Support Voice VLAN Support QinQ\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePort features\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport port aggregation, port mirroring, port isolation, port traffic identification, RSPAN\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSpanning tree\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport STP, RSTP, MSTP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDHCP\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eupport DHCP Client, DHCP Relay, DHCP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport VSM virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport static routing Support RIPv1\/v2, OSPF, BGP, VRRP Support RIPng, OSPFv3, BGP4+ for IPv6, and VRRPv3 Support policy-go-together\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport IGMP Snooping and IGMP Proxy Support GMRP Support PIM-SM, PIM-SSM, PIM-DM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eACL\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport ACL rules based on VLAN, MAC address, IP address, TCP\/UDP port number\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eQoS\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport 8 priority queues per port Support traffic classification based on 802.1p\/DSCP\/TOS Support speed limit on ports and streams Support SP, WRR, SP + WRR queue scheduling\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport local and centralized authentication based on MAC address Support local and centralized authentication based on 802.1x Support local and centralized authentication based on Portal Support dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection Support port isolation, port security Support broadcast storm suppression Support SSH2.0\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport MON Support NTP Support real-time temperature detection and alarm Support SNMP, CLI, Web management, and Unified Management Center (UMC) Support local and remote output of system logs, operation logs, debugging information\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8247856005410,"title":"LSW5662-SE Series","handle":"dptech-lsw5662-se-series-ethernet-switches","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eTraditional intranet is a shared network, with no access control on terminals or mutual access among terminals. This vulnerability can be easily exploited by hackers to spread viruses and attacks. In case of intranet security incidents, it is impossible to locate and control the source of attack in the first place and extremely difficult to trace back. DPtech LSW5662-SE Series Self-Secure switches provide the network with security protection and exception disposal capabilities by taking advantage of intelligent computing technology. The built-in behavior model and baseline detection provides the Self-Secure switches with immunity to virus transmission, network attacks, and hacker penetration. With automatic policy deployment, self inspection and recovery of ring networks, and baseline detection, it can further extend its security protection to intranet, realizing threat suppression of key nodes of network, operation and maintenance of the entire network, and simplified network management.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eBehavior model detection to enable virus suppression and other threats\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eWith its built-in behavior model and traffic baseline, the LSW5662-SE Series can provide timely alerts on abnormal network events, such as virus transmission, IP\/MAC spoofing, bots attacks and hacker penetration, and contain such events within one switch.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFast loop blocking to pinpoint exceptions\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eBased on the Technology of industry’s unique real-time loop detection, the LSW5662-SE Series can spot and block the switch’s own loop, downlink switch and Hub loop, and pinpoint loop interfaces and loop vlan through active detection and passive monitoring.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eEffectively detect breaches to provide clean intranets\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe LSW5662-SE Series can spot illegal inline behaviors of connected devices (such as small routers) to avoid network security threats and daily operation and maintenance problems caused by private connections, ensuring compliance and reliability of intranet access devices.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eAutomatic deployment of policies to enable convenient operation and maintenance\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough real-time interactions of security policies with the Self-Secure management platform, the LSW5662-SE Series enables administrators to distribute threat disposals on a unified management interface, making sure the security policies take effects on a real time basis and simplifying network operation and maintenance.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eA wide temperature range of 0°C~70°C\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe LSW5662-SE Series adopts an environment-enhanced design, which provides features such as a wide range of operating temperature (i.e., 0°C~70°C) and pressure, and lightning protection. This helps ensure highly reliable operation in complex electrical environments (e.g., LV well) and air-conditioning free deployment environments.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eComprehensive IPv6 features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe LSW5662-SE Series Self-Secure switches support IPv4\/IPv6 dual stack and IPv6 over IPv4 Tunnel (including manual Tunnel, 6to4 Tunnel, ISATAP Tunnel) as well as IPv6 layer 3 wire-speed forwarding. It can be flexibly deployed on a network with only IPv4 or IPv6, or with both IPv4 and IPv6, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Name\u003c\/th\u003e\n\u003cth\u003eLSW5662-28GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW5662-48GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW5662-24GP4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW5662-48GP4XGS-SE\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e20 Gigabit electrical interfaces + 8 Gigabit\u003cbr\u003eCombo+4 10-Gigabit optical interfaces\u003cbr\u003e(SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit electrical interfaces + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e16 Gigabit optical interfaces + 8 Gigabit Combo + 4 10-Gigabit optical interfaces\u003cbr\u003e(SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit optical interfaces (SFP); 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e342Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\u003c\/td\u003e\n\u003ctd\u003e342Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eExpansion Slots\u003c\/td\u003e\n\u003ctd colspan=\"5\"\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eInterface Module\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e2-port 40G optical interface module (QSFP), 8-port 10-Gigabit optical interface module (SFP+), 8-port 10-Gigabit Ethernet interface module, 1-port 40G optical interface module (QSFP),4-port 10-Gigabit optical interface module (SFP+), 2-port 10-Gigabit optical interface module (SFP+), 8-port Gigabit optical interface module (SFP),8 port Gigabit electrical interface module, 4 port Gigabit optical interface module (SFP) + 4 port Gigabit electrical interface module\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eProtection againstintranet attacks\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport IP scanning, UDP scanning, TCP scanning and other hacking behaviors;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDevice protection\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network;\u003cbr\u003eSupport real-time discovery and blocking of TP-Link, D-Link and other small routers;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Loop suppression\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSpot and block the switch’s own loop, downlink switch and HUB loop, and pinpoint loop interfaces and loop vlan\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser awareness\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport identification of the type of access terminals and access locations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension(W*D*H)\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003ehot-plug, modular dual power supply, support AC\/DC\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e70W\u003c\/td\u003e\n\u003ctd\u003e61W\u003c\/td\u003e\n\u003ctd\u003e90W\u003c\/td\u003e\n\u003ctd\u003e108W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e0℃~70℃, 6KV interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport layer 3 routing of IPv4 and IPv6;\u003cbr\u003eSupport static routing;Support RIPv1\/v2, OSPF, BGP, VRRP;\u003cbr\u003eSupport RIPng, OSPFv3, BGP4+ for IPv6, and VRRPv3;\u003cbr\u003eSupport policy-go-together;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport VSM virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003cbr\u003eSupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network;\u003cbr\u003eSupport local and centralized authentication based on MAC address;\u003cbr\u003eSupport local and centralized authentication based on 802.1x;\u003cbr\u003eSupport local and centralized authentication based on Portal;\u003cbr\u003eSupport dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection;\u003cbr\u003eSupport port isolation, port security;\u003cbr\u003eSupport broadcast storm suppression;\u003cbr\u003eSupport SSH2.0;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport RMON;\u003cbr\u003eSupport IEEE 1588v2 PTP;\u003cbr\u003eSupport real-time temperature detection and alarm;\u003cbr\u003eSupport SNMP, CLI, Web management, and Unified Management Center (UMC);\u003cbr\u003eSupport local and remote output of system logs, operation logs, commissioning and debugging information, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T20:35:48+08:00","created_at":"2023-04-27T20:34:03+08:00","vendor":"DPtech","type":"Network Switches","tags":["Self-Secure Networking"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45046691365154,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW5662-SE Series","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-SE-Series-7623.jpg?v=1695244420"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-SE-Series-7623.jpg?v=1695244420","options":["Title"],"media":[{"alt":"DPtech LSW5662-SE Series - vnetwork","id":34460717515042,"position":1,"preview_image":{"aspect_ratio":1.0,"height":800,"width":800,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-SE-Series-7623.jpg?v=1695244420"},"aspect_ratio":1.0,"height":800,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW5662-SE-Series-7623.jpg?v=1695244420","width":800}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eTraditional intranet is a shared network, with no access control on terminals or mutual access among terminals. This vulnerability can be easily exploited by hackers to spread viruses and attacks. In case of intranet security incidents, it is impossible to locate and control the source of attack in the first place and extremely difficult to trace back. DPtech LSW5662-SE Series Self-Secure switches provide the network with security protection and exception disposal capabilities by taking advantage of intelligent computing technology. The built-in behavior model and baseline detection provides the Self-Secure switches with immunity to virus transmission, network attacks, and hacker penetration. With automatic policy deployment, self inspection and recovery of ring networks, and baseline detection, it can further extend its security protection to intranet, realizing threat suppression of key nodes of network, operation and maintenance of the entire network, and simplified network management.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eBehavior model detection to enable virus suppression and other threats\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eWith its built-in behavior model and traffic baseline, the LSW5662-SE Series can provide timely alerts on abnormal network events, such as virus transmission, IP\/MAC spoofing, bots attacks and hacker penetration, and contain such events within one switch.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFast loop blocking to pinpoint exceptions\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eBased on the Technology of industry’s unique real-time loop detection, the LSW5662-SE Series can spot and block the switch’s own loop, downlink switch and Hub loop, and pinpoint loop interfaces and loop vlan through active detection and passive monitoring.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eEffectively detect breaches to provide clean intranets\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe LSW5662-SE Series can spot illegal inline behaviors of connected devices (such as small routers) to avoid network security threats and daily operation and maintenance problems caused by private connections, ensuring compliance and reliability of intranet access devices.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eAutomatic deployment of policies to enable convenient operation and maintenance\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough real-time interactions of security policies with the Self-Secure management platform, the LSW5662-SE Series enables administrators to distribute threat disposals on a unified management interface, making sure the security policies take effects on a real time basis and simplifying network operation and maintenance.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eA wide temperature range of 0°C~70°C\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe LSW5662-SE Series adopts an environment-enhanced design, which provides features such as a wide range of operating temperature (i.e., 0°C~70°C) and pressure, and lightning protection. This helps ensure highly reliable operation in complex electrical environments (e.g., LV well) and air-conditioning free deployment environments.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eComprehensive IPv6 features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThe LSW5662-SE Series Self-Secure switches support IPv4\/IPv6 dual stack and IPv6 over IPv4 Tunnel (including manual Tunnel, 6to4 Tunnel, ISATAP Tunnel) as well as IPv6 layer 3 wire-speed forwarding. It can be flexibly deployed on a network with only IPv4 or IPv6, or with both IPv4 and IPv6, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003eProduct Name\u003c\/th\u003e\n\u003cth\u003eLSW5662-28GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW5662-48GT4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW5662-24GP4XGS-SE\u003c\/th\u003e\n\u003cth\u003eLSW5662-48GP4XGS-SE\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e20 Gigabit electrical interfaces + 8 Gigabit\u003cbr\u003eCombo+4 10-Gigabit optical interfaces\u003cbr\u003e(SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit electrical interfaces + 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003ctd\u003e16 Gigabit optical interfaces + 8 Gigabit Combo + 4 10-Gigabit optical interfaces\u003cbr\u003e(SFP+)\u003c\/td\u003e\n\u003ctd\u003e48 Gigabit optical interfaces (SFP); 4 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003ctd\u003e758Gbps\/7.58Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e342Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\u003c\/td\u003e\n\u003ctd\u003e342Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eExpansion Slots\u003c\/td\u003e\n\u003ctd colspan=\"5\"\u003e1 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eInterface Module\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e2-port 40G optical interface module (QSFP), 8-port 10-Gigabit optical interface module (SFP+), 8-port 10-Gigabit Ethernet interface module, 1-port 40G optical interface module (QSFP),4-port 10-Gigabit optical interface module (SFP+), 2-port 10-Gigabit optical interface module (SFP+), 8-port Gigabit optical interface module (SFP),8 port Gigabit electrical interface module, 4 port Gigabit optical interface module (SFP) + 4 port Gigabit electrical interface module\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eProtection againstintranet attacks\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport IP scanning, UDP scanning, TCP scanning and other hacking behaviors;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDevice protection\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network;\u003cbr\u003eSupport real-time discovery and blocking of TP-Link, D-Link and other small routers;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Loop suppression\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSpot and block the switch’s own loop, downlink switch and HUB loop, and pinpoint loop interfaces and loop vlan\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eUser awareness\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport identification of the type of access terminals and access locations\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension(W*D*H)\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003ctd\u003e440mm*400mm*44mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003ehot-plug, modular dual power supply, support AC\/DC\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e70W\u003c\/td\u003e\n\u003ctd\u003e61W\u003c\/td\u003e\n\u003ctd\u003e90W\u003c\/td\u003e\n\u003ctd\u003e108W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003e0℃~70℃, 6KV interface lightning protection\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport layer 3 routing of IPv4 and IPv6;\u003cbr\u003eSupport static routing;Support RIPv1\/v2, OSPF, BGP, VRRP;\u003cbr\u003eSupport RIPng, OSPFv3, BGP4+ for IPv6, and VRRPv3;\u003cbr\u003eSupport policy-go-together;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport VSM virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport locating and blocking of IP spoofing, ARP spoofing, ARP flooding and other common network threats;\u003cbr\u003eSupport identifying and blocking of intranet virus and Trojan horse spreading;\u003cbr\u003eSupport locating, alerting and blocking of the source host of intranet attacks;\u003cbr\u003eSupport automatic discovery and protection of IP cameras, entrance control, printers, and all-in-one devices in the network;\u003cbr\u003eSupport local and centralized authentication based on MAC address;\u003cbr\u003eSupport local and centralized authentication based on 802.1x;\u003cbr\u003eSupport local and centralized authentication based on Portal;\u003cbr\u003eSupport dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection;\u003cbr\u003eSupport port isolation, port security;\u003cbr\u003eSupport broadcast storm suppression;\u003cbr\u003eSupport SSH2.0;\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"4\"\u003eSupport RMON;\u003cbr\u003eSupport IEEE 1588v2 PTP;\u003cbr\u003eSupport real-time temperature detection and alarm;\u003cbr\u003eSupport SNMP, CLI, Web management, and Unified Management Center (UMC);\u003cbr\u003eSupport local and remote output of system logs, operation logs, commissioning and debugging information, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8247854661922,"title":"LSW6600 10G\/40G Fixed Port Switch","handle":"lsw6600-series","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDPtech LSW6600 Series Switches are the next generation high-density 10G Ethernet switches presented by DPtech. Based on the industry’s leading 40G\/100G hardware architecture and DPtech’s ConPlat operating system, the Series is equipped with virtualization technology and rich data center features. It provides up to 48 wire-speed 10G interfaces on 1U equipment. It also has 40G uplink interfaces to meet the requirements of high-density 10G access and 40G\/100G uplink in TOR deployment of the next generation data centers. In addition to 10G access switches for cloud data centers, the LSW6600 can also serve as a core for small- or medium-sized secure networks or a aggregation equipment for large-scale secure networks.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh-capacity high-density 10G interface\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series provides a maximum switching capacity of 2.56Tbps, 1200Mpps forwarding performance, and full wire-speed switching architecture. It is the industry’s first-class 1U cassette switch, with up to 48 SFP+ optical interfaces and 6 40G QSFP+ interfaces. In 40G mode or 4 10G mode, the 40G QSFP+ interfaces can be expanded to provide the whole unit with up to 72 10G interfaces capability, meeting the challenge of high density and high bandwidth access in next-generation cloud computing data centers.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich data center features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series is equipped with the TRILL (Transparent Interconnection of Lots of Links) technology to enable construction of ultra-large layer 2 networks consisting of more than 10,000 physical servers. In combination of ISIS routing, the TRILL technology calculates the forwarding paths to address the issue of a single forwarding path and loops, thus improving bandwidth utilization to 100%. In this way, it significantly enhances network stability and realizes quick convergence of the Layer 2 network.\u003cbr\u003eCompatible with VXLAN, 802.3 Qbg, DCB (Data Center Bridging), PFC (Priority-based Flow Control) and ETS (Enhanced Transmission Selection), the LSW660 Series enables a highly integrated network combining traditional front-end server and back-end storage.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVirtual Switching Matrix (VSM)\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series adopts Virtual Switching Matrix (VSM) technology, which performs virtualization of multiple physical devices into a single logical device for unified configuration and management. \u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security control policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith a built-in authentication server, the LSW6600 Series provides multiple authentication modes based on MAC address, 802.1x, and Portal. It supports dynamic or static binding of user identity, such as user account, IP, MAC, VLAN, and interface. Dynamic distribution of policies is supported.\u003cbr\u003eThe LSW6600 Series is provided with enhanced ACL by supporting large-capacity ingress and egress ACLs. It also enables ACL distribution based on VLAN, which simplifies user configuration and avoids waste of ACL resources.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich QoS policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series supports traffic identification on interfaces. It provides multiple stream classification based on source MAC address, destination MAC address, source IP address, destination IP address, TCP\/UDP port number, protocol type, and VLAN. With priority queues based on hardware, it is compatible with multiple queue scheduling algorithms such as SP, WRR, and SP+WPP. Support congestion management and rate limits on interfaces.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull support of IPV4\/IPv6 dual stack\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series supports IPv4\/IPv6 dual stack and IPv6 over IPv4 Tunnel (including manual Tunnel, 6to4 Tunnel, ISATAP Tunnel) as well as IPv6 layer 3 wire-speed forwarding. It can be flexibly deployed on a network with only IPv4 or IPv4, or with both IPv4 and IPv4, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Name\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW6600-48XGS6QXP\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW6600-8GT24XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e48 10-Gigabit optical interfaces (SFP+) + +6 40-Gigabit optical interfaces (QSFP+)\u003c\/td\u003e\n\u003ctd\u003e8 Gigabit electrical interfaces (RJ45) + +24 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement interfaces\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eConsole port\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e2.56Tbps\/40.96Tbps\u003c\/td\u003e\n\u003ctd\u003e2.56Tbps\/36Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eForwarding performance\u003c\/td\u003e\n\u003ctd\u003e1200Mpps\/1740Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDelay\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e\u0026lt;6us\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSize of MAC address table\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e128K\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVLAN\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e4K\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum length of long frame\u003c\/td\u003e\n\u003ctd\u003e13K\u003c\/td\u003e\n\u003ctd\u003e12K\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width * depth * height) (in mm)\u003c\/td\u003e\n\u003ctd\u003e440×690×44\u003c\/td\u003e\n\u003ctd\u003e440×420×44\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eModular power supply redundancy\u003c\/td\u003e\n\u003ctd\u003eSolidified power supply redundancy\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e250W\u003c\/td\u003e\n\u003ctd\u003e130W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e0℃~45℃\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eInterface management\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport Port trunk, basic port functions, LACP, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSpanning tree\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport STP, RSTP, MSTP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDHCP\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport DHCP Client, DHCP Relay, DHCP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc. IPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport VSM virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport GMRP Support IGMP Snooping, IGMP Proxy; Support PIM-SM, PIM-SSM, PIM-DM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eData Center Features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport 802.1Qbg, TRILL, VXLAN, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eQoS features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport traffic classification based on 802.1p\/DSCP\/TOS Support speed limit on ports and streams Support SP, WRR, SP + WRR queue scheduling\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport local and centralized authentication based on MAC address Support local and centralized authentication based on 802.1x Support local and centralized authentication based on Portal Support dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection; Support port isolation, Static Port Access Control\u003cbr\u003eSupport broadcast storm suppression\u003cbr\u003eSupport SSH2.0\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHigh reliability\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eCompatible with fast ring network recovery protocol (FRRP) and fast link recovery protocol (FLRP) Support VRRP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport MON Support IEEE 1588v2 PTP Support real-time temperature detection and alarm Support SNMP, CLI, Web management, and Unified Management Center (UMC) Support local and remote output of system logs, operation logs, debugging information\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e\u003cbr\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1249\u0026amp;id=43\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1249\u0026amp;id=26\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630032222997.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPtech LSW6600 Series Ethernet Switches - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T20:30:25+08:00","created_at":"2023-04-27T20:30:26+08:00","vendor":"DPtech","type":"Network Switches","tags":["Self-Secure Networking"],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45046683107618,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"LSW6600 10G\/40G Fixed Port Switch","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW6600-10G-40G-Fixed-Port-Switch-8955.jpg?v=1695244421"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW6600-10G-40G-Fixed-Port-Switch-8955.jpg?v=1695244421","options":["Title"],"media":[{"alt":"DPtech LSW6600 10G\/40G Fixed Port Switch - vnetwork","id":34460717252898,"position":1,"preview_image":{"aspect_ratio":1.0,"height":633,"width":633,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW6600-10G-40G-Fixed-Port-Switch-8955.jpg?v=1695244421"},"aspect_ratio":1.0,"height":633,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-LSW6600-10G-40G-Fixed-Port-Switch-8955.jpg?v=1695244421","width":633}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDPtech LSW6600 Series Switches are the next generation high-density 10G Ethernet switches presented by DPtech. Based on the industry’s leading 40G\/100G hardware architecture and DPtech’s ConPlat operating system, the Series is equipped with virtualization technology and rich data center features. It provides up to 48 wire-speed 10G interfaces on 1U equipment. It also has 40G uplink interfaces to meet the requirements of high-density 10G access and 40G\/100G uplink in TOR deployment of the next generation data centers. In addition to 10G access switches for cloud data centers, the LSW6600 can also serve as a core for small- or medium-sized secure networks or a aggregation equipment for large-scale secure networks.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh-capacity high-density 10G interface\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series provides a maximum switching capacity of 2.56Tbps, 1200Mpps forwarding performance, and full wire-speed switching architecture. It is the industry’s first-class 1U cassette switch, with up to 48 SFP+ optical interfaces and 6 40G QSFP+ interfaces. In 40G mode or 4 10G mode, the 40G QSFP+ interfaces can be expanded to provide the whole unit with up to 72 10G interfaces capability, meeting the challenge of high density and high bandwidth access in next-generation cloud computing data centers.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich data center features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series is equipped with the TRILL (Transparent Interconnection of Lots of Links) technology to enable construction of ultra-large layer 2 networks consisting of more than 10,000 physical servers. In combination of ISIS routing, the TRILL technology calculates the forwarding paths to address the issue of a single forwarding path and loops, thus improving bandwidth utilization to 100%. In this way, it significantly enhances network stability and realizes quick convergence of the Layer 2 network.\u003cbr\u003eCompatible with VXLAN, 802.3 Qbg, DCB (Data Center Bridging), PFC (Priority-based Flow Control) and ETS (Enhanced Transmission Selection), the LSW660 Series enables a highly integrated network combining traditional front-end server and back-end storage.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eVirtual Switching Matrix (VSM)\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series adopts Virtual Switching Matrix (VSM) technology, which performs virtualization of multiple physical devices into a single logical device for unified configuration and management. \u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSound security control policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eWith a built-in authentication server, the LSW6600 Series provides multiple authentication modes based on MAC address, 802.1x, and Portal. It supports dynamic or static binding of user identity, such as user account, IP, MAC, VLAN, and interface. Dynamic distribution of policies is supported.\u003cbr\u003eThe LSW6600 Series is provided with enhanced ACL by supporting large-capacity ingress and egress ACLs. It also enables ACL distribution based on VLAN, which simplifies user configuration and avoids waste of ACL resources.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRich QoS policy\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series supports traffic identification on interfaces. It provides multiple stream classification based on source MAC address, destination MAC address, source IP address, destination IP address, TCP\/UDP port number, protocol type, and VLAN. With priority queues based on hardware, it is compatible with multiple queue scheduling algorithms such as SP, WRR, and SP+WPP. Support congestion management and rate limits on interfaces.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull support of IPV4\/IPv6 dual stack\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe LSW6600 Series supports IPv4\/IPv6 dual stack and IPv6 over IPv4 Tunnel (including manual Tunnel, 6to4 Tunnel, ISATAP Tunnel) as well as IPv6 layer 3 wire-speed forwarding. It can be flexibly deployed on a network with only IPv4 or IPv4, or with both IPv4 and IPv4, thus satisfying the transition requirements from IPv4 to IPv6.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Name\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW6600-48XGS6QXP\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eLSW6600-8GT24XGS\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService interface\u003c\/td\u003e\n\u003ctd\u003e48 10-Gigabit optical interfaces (SFP+) + +6 40-Gigabit optical interfaces (QSFP+)\u003c\/td\u003e\n\u003ctd\u003e8 Gigabit electrical interfaces (RJ45) + +24 10-Gigabit optical interfaces (SFP+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement interfaces\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eConsole port\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e2.56Tbps\/40.96Tbps\u003c\/td\u003e\n\u003ctd\u003e2.56Tbps\/36Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eForwarding performance\u003c\/td\u003e\n\u003ctd\u003e1200Mpps\/1740Mpps\u003c\/td\u003e\n\u003ctd\u003e372Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDelay\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e\u0026lt;6us\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSize of MAC address table\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e128K\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVLAN\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e4K\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum length of long frame\u003c\/td\u003e\n\u003ctd\u003e13K\u003c\/td\u003e\n\u003ctd\u003e12K\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width * depth * height) (in mm)\u003c\/td\u003e\n\u003ctd\u003e440×690×44\u003c\/td\u003e\n\u003ctd\u003e440×420×44\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eModular power supply redundancy\u003c\/td\u003e\n\u003ctd\u003eSolidified power supply redundancy\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower Consumption\u003c\/td\u003e\n\u003ctd\u003e250W\u003c\/td\u003e\n\u003ctd\u003e130W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOperating environment\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003e0℃~45℃\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eInterface management\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport Port trunk, basic port functions, LACP, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSpanning tree\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport STP, RSTP, MSTP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDHCP\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport DHCP Client, DHCP Relay, DHCP Snooping\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eIP routing\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc. IPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport VSM virtualization\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport GMRP Support IGMP Snooping, IGMP Proxy; Support PIM-SM, PIM-SSM, PIM-DM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eData Center Features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport 802.1Qbg, TRILL, VXLAN, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eQoS features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport traffic classification based on 802.1p\/DSCP\/TOS Support speed limit on ports and streams Support SP, WRR, SP + WRR queue scheduling\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSecurity features\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport local and centralized authentication based on MAC address Support local and centralized authentication based on 802.1x Support local and centralized authentication based on Portal Support dynamic ARP detection, one-click ARP binding, authorized ARP, ARP source suppression, ARP source address inspection; Support port isolation, Static Port Access Control\u003cbr\u003eSupport broadcast storm suppression\u003cbr\u003eSupport SSH2.0\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eHigh reliability\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eCompatible with fast ring network recovery protocol (FRRP) and fast link recovery protocol (FLRP) Support VRRP\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement and Maintenance\u003c\/td\u003e\n\u003ctd colspan=\"2\"\u003eSupport MON Support IEEE 1588v2 PTP Support real-time temperature detection and alarm Support SNMP, CLI, Web management, and Unified Management Center (UMC) Support local and remote output of system logs, operation logs, debugging information\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e\u003cbr\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1249\u0026amp;id=43\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1249\u0026amp;id=26\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630032222997.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPtech LSW6600 Series Ethernet Switches - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8247849156898,"title":"DPX17000 Security Network Core L2-7","handle":"dpx17000-series","description":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eNetwork connectivity is of paramount significance at the very beginning of network construction. However, given the ever-increasing network size and diversified business categories, providing high performance cloud computing capability on the basis of network connectivity while ensuring a secure and controlled multi-service environment has drawn greater attention from users. In response, DPtech launched the DPX17000 Series next generation deep service core switches, designed for large secure networks and cloud data centers.\u003c\/p\u003e\n\u003cp\u003eBased on DPtech’s core technologies including APP-X hardware architecture, ConPlat operating system and APP-ID application and threat signature database, the DPX17000 Series uses a flexible switching architecture with separated control plane and forwarding plane to meet 40G and 100G high-density interface expansion requirements through a 100G platform design. Supporting multiple data center features, it realizes deep integration of network and service, providing enterprises users with next generation network infrastructure that is high-speed, intelligent and reliable.\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh Performance Security Network Core\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX17000 Series is designed with a cutting-edge CLOS architecture, separated control plane and forwarding plane, and relatively independent master control engine and switch boards. In this way, it helps greatly improve device reliability while laying a foundation for future bandwidth upgrades. With an innovative semi-slot design concept, it offers users with more flexible expansion methods and fully satisfies the application requirements of next-generation enterprise network for a fundamental IT platform.\u003cbr\u003e\u003cbr\u003eDPX17000 Series makes an innovative progress from network security to security network. Moreover, the traditional blacklist mechanism has evolved to the whitelist concept centered on management and control.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eL2~7 Virtualization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eRelying on VSM and OVC technologies independently developed by DPtech, the DPX17000 Series converts multiple similar service modules into a flexible scheduling resource pool, thus enabling a granular management of business platform resources and improving the utilization of resources. In conjunction with UMC management platform, it provides users with automatic management and operation and maintenance solutions.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Service Integration Capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCombing switching\u0026amp;routing, network security and application delivery, the DPX17000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eWith a series of rich business scalability capabilities, the DPX17000 Series provides more than 10 service slots including iNAC, application delivery, application firewall, IoT application security control system, IPS, Unified Audit Gateway (UAG) and traffic control, anti-DDoS system, WAF, vulnerability scanning, and wireless controller.\u003cbr\u003e\u003cbr\u003eThe hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003e\u003cbr\u003eWith strong network adaptability, it offers full support of QoS, IPv4\/IPv6 routing, MPLS VPN and other network services.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eInnovative service chain Technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the innovative “service chain” concept, the DPX17000 Series is able to provide refined definition to data streams according to portfolio policies, customize data flow directions among various service modules, remove limitations of traffic scheduling between different service modules, and realize flexible scheduling at the business layer.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSDN and Data Center Features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX17000 Series supports mainstream Overlay standards such as VXLAN to address the issue of multi-tenancy. It offers a flexible virtual machine migration solution so as to meet users’ needs for large-scale server deployment and cross-domain connectivity in cloud computing environments. It is compatible with Openflow1.3 protocol, and offers multiple controllers and multi-level flow tables. It can serve as Openflow-hybrid to allow Openflow operations and standard Ethernet switching simultaneously.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull backward compatibility with DPX8000\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX17000 Series supports a maximum of 20 expansion slots and is backward compatible with the DPX8000 Series boards to protect users’ investment effectively.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFully redundant hardware architecture DPX17000 Series supports master control board 1+1 redundancy, switching board N+1 redundancy, fan module 1+1 redundancy, power supply module N+M redundancy. It supports uninterrupted restart, hot fixes, separated data\/control\/monitoring planes and other technologies, ensuring 99.999% carrier-grade reliability. It supports BFD, OAM and other fast fault detection technologies, and provides a series of device-level and network-level fault detection methods.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGreen and energy efficiency\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIn response to an orthogonal architecture of service boards and switching boards, the DPX17000 Series is equipped with multiple innovative cooling technologies such as a dual air duct design, increasing heat radiation efficiency by 30%.\u003cbr\u003e\u003cbr\u003eIt is capable of performing temperature detection on key components such as service boards and switching boards. Based on the temperature and configuration of each component, it can realize intelligent fan speed regulation, reduce power consumption and environmental noise, and guarantee energy efficiency.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX17000-A5\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX17000-A12\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX17000-A20\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e53.1Tbps\/204.8Tbps\u003c\/td\u003e\n\u003ctd\u003e88Tbps\/307.2Tbps\u003c\/td\u003e\n\u003ctd\u003e135Tbps\/387Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e8400Mpps\/48000Mpps\u003c\/td\u003e\n\u003ctd\u003e14400Mpps\/86400Mpps\u003c\/td\u003e\n\u003ctd\u003e19200Mpps\/115200Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of master control slots\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of switching boards\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e1—4\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum service slots\u003c\/td\u003e\n\u003ctd\u003e5\u003c\/td\u003e\n\u003ctd\u003e12\u003c\/td\u003e\n\u003ctd\u003e20\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVSM hardware cluster\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 2)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 4)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 6)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of port\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 24 GE ports, 48 GE optical interfaces, 48 GE electrical interfaces, 4 10GE ports, 8 10GE ports, 16 10GE ports, 32 10GE ports, 2 40GE ports, 12 40GE ports, 4 100GE ports, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of service board\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eiNAC, application delivery, application firewall, IoT application security control system, IPS, Unified Audit Gateway (UAG) and traffic control, anti-DDoS system, WAF, vulnerability scanning, SSL VPN, and wireless controller.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLayer-2 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eVLAN、STP、RSTP、MSTP、QinQ、灵活 QinQ、VLAN Mapping、链路聚合、跨板链VLAN, STP, RSTP, MSTP, QinQ, flexible QinQ, VLAN Mapping, link aggregation, cross-board link aggregation, cross-board port\/flow mirroring, port broadcast\/multicast\/unknown unicast forwarding storm suppression, Jumbo Frame, VLAN division based on port\/protocol\/subnet and MAC, PVLAN, GVRP, CoS priority, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLayer-3 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc IPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple L2 ~ 7 physical devices into a single L2 ~7 logical device Support OVC (OS-Level Virtual Context) 1:M virtualization technology, which performs virtualization of a single L2 ~7 physical\/logical device into multiple L2 ~ 7 logical devices Support service chain technology, which defines business streams based on L2-7 protocol features, and allows on-demand assignment of physical\/logical service modules for traffic passage Support IP-based unified management between the host and service modules and unified configuration interface\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS\/VPLS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSDN and Data Center Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 802.1Qbg and DCB Support mainstream Overlay standards such as VXLAN Support Openflow1.3 protocol\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOther network layer features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport ACL rules including source IP, source port, destination IP, destination port, protocol number, physical port Support Ingress\/Egress CAR, 802.1P\/DSCP priority Mark\/Remark Support permit, deny, redirect, VLAN modification, mirroring and other actions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Service features of iNAC\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport Portal, 802.1x, IP\/MAC, SMS access Support non-sensing roaming to enhance users’ access experience Support policy follow-up to granular access contrl for users Support personnel traceability, ensuring accountability Support unified management of users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application delivery\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport link load balancing, server load balancing, application acceleration to ensure fast and available of applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application firewall\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport security domain division, access isolation, attack prevention, NAT, IPSec\/SSL\/L2TP VPN, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of IPS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt provides seven layers of security defense with active prevention against vulnerability exploit\/exploitation, web page tampering, and SQL injection; IPS also has a built-in professional virus library that can block various worms and viruses in real time\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eService features of UAG \u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eTraffic control: seven layers of detection, classification and control enables immediate visualization of network traffic and applications; traffic control over non-critical services such as P2P and games helps ensure bandwidth for critical services and convenient management of network bandwidth\u003cbr\u003eUnified auditing: through a detailed review of access histories and permission management of Web access, online games, stock trading, online film and television and other online behaviors, it helps ensure they meet relevant requirements and laws and regulations; with a signature library consisting of more than 5,000 network layer and application layer protocols, as well as a URL address library consisting of ten million entries, it allows refined UAG for users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of Anti-DDoS system\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCombining detection and cleaning to effectively protect metropolitan area networks and IDCs from a huge amount of DDoS attacks\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of WAF\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt supports Web application security protection, offering vulnerability protection, Web policy optimization, HTTP protocol reinforcement and other functions to ensure the availability and reliability of Web applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eServices features of wireless controllers\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 801.11ac AP and 802.11n AP Management, wireless user access control and security protection Support 802.1x, MAC address and Portal authentication; support centralized\/distributed forwarding\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport FTP, TFTP, Xmodem\u003cbr\u003eSupport Web management port, SNMP v1\/v2\/v3\u003cbr\u003eSupport RMON, NTP clock, intelligent power management\u003cbr\u003eSupport unified management platform (UMC)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Reliability\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCLOS architecture, and separated master control engine and switching boards It supports uninterrupted forwarding, Graceful Restart, hot fixes, separated data\/control\/monitoring planes and other technologies Support BFD, OAM and other fast fault detection technologies Support master control board 1+1 redundancy, switching board N+1 redundancy, fan module 1+1 redundancy, power supply module N+M redundancy Support online status monitoring protocol to perform detection of key components including master control engine, backplane, chip and storage\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e2400W\u003c\/td\u003e\n\u003ctd\u003e4800W\u003c\/td\u003e\n\u003ctd\u003e7200W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e25.8kg\u003c\/td\u003e\n\u003ctd\u003e49.1kg\u003c\/td\u003e\n\u003ctd\u003e80kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width x height x depth) (in mm)\u003c\/td\u003e\n\u003ctd\u003e442×309×480\u003c\/td\u003e\n\u003ctd\u003e442×703×480\u003c\/td\u003e\n\u003ctd\u003e442×1019×480\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T20:24:10+08:00","created_at":"2023-04-27T20:24:10+08:00","vendor":"DPtech","type":"Self-Secure Networking","tags":[],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45046661513506,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"DPX17000 Security Network Core L2-7","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX17000-Security-Network-Core-L2-7-9841.jpg?v=1695244415"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX17000-Security-Network-Core-L2-7-9841.jpg?v=1695244415","options":["Title"],"media":[{"alt":"DPtech DPX17000 Security Network Core L2-7 - vnetwork","id":34459448017186,"position":1,"preview_image":{"aspect_ratio":1.0,"height":459,"width":459,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX17000-Security-Network-Core-L2-7-9841.jpg?v=1695244415"},"aspect_ratio":1.0,"height":459,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX17000-Security-Network-Core-L2-7-9841.jpg?v=1695244415","width":459}],"content":"\u003cmeta charset=\"UTF-8\"\u003e\n\u003cp\u003eNetwork connectivity is of paramount significance at the very beginning of network construction. However, given the ever-increasing network size and diversified business categories, providing high performance cloud computing capability on the basis of network connectivity while ensuring a secure and controlled multi-service environment has drawn greater attention from users. In response, DPtech launched the DPX17000 Series next generation deep service core switches, designed for large secure networks and cloud data centers.\u003c\/p\u003e\n\u003cp\u003eBased on DPtech’s core technologies including APP-X hardware architecture, ConPlat operating system and APP-ID application and threat signature database, the DPX17000 Series uses a flexible switching architecture with separated control plane and forwarding plane to meet 40G and 100G high-density interface expansion requirements through a 100G platform design. Supporting multiple data center features, it realizes deep integration of network and service, providing enterprises users with next generation network infrastructure that is high-speed, intelligent and reliable.\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eHigh Performance Security Network Core\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX17000 Series is designed with a cutting-edge CLOS architecture, separated control plane and forwarding plane, and relatively independent master control engine and switch boards. In this way, it helps greatly improve device reliability while laying a foundation for future bandwidth upgrades. With an innovative semi-slot design concept, it offers users with more flexible expansion methods and fully satisfies the application requirements of next-generation enterprise network for a fundamental IT platform.\u003cbr\u003e\u003cbr\u003eDPX17000 Series makes an innovative progress from network security to security network. Moreover, the traditional blacklist mechanism has evolved to the whitelist concept centered on management and control.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eL2~7 Virtualization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eRelying on VSM and OVC technologies independently developed by DPtech, the DPX17000 Series converts multiple similar service modules into a flexible scheduling resource pool, thus enabling a granular management of business platform resources and improving the utilization of resources. In conjunction with UMC management platform, it provides users with automatic management and operation and maintenance solutions.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Service Integration Capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCombing switching\u0026amp;routing, network security and application delivery, the DPX17000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eWith a series of rich business scalability capabilities, the DPX17000 Series provides more than 10 service slots including iNAC, application delivery, application firewall, IoT application security control system, IPS, Unified Audit Gateway (UAG) and traffic control, anti-DDoS system, WAF, vulnerability scanning, and wireless controller.\u003cbr\u003e\u003cbr\u003eThe hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003e\u003cbr\u003eWith strong network adaptability, it offers full support of QoS, IPv4\/IPv6 routing, MPLS VPN and other network services.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eInnovative service chain Technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the innovative “service chain” concept, the DPX17000 Series is able to provide refined definition to data streams according to portfolio policies, customize data flow directions among various service modules, remove limitations of traffic scheduling between different service modules, and realize flexible scheduling at the business layer.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSDN and Data Center Features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX17000 Series supports mainstream Overlay standards such as VXLAN to address the issue of multi-tenancy. It offers a flexible virtual machine migration solution so as to meet users’ needs for large-scale server deployment and cross-domain connectivity in cloud computing environments. It is compatible with Openflow1.3 protocol, and offers multiple controllers and multi-level flow tables. It can serve as Openflow-hybrid to allow Openflow operations and standard Ethernet switching simultaneously.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull backward compatibility with DPX8000\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX17000 Series supports a maximum of 20 expansion slots and is backward compatible with the DPX8000 Series boards to protect users’ investment effectively.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFully redundant hardware architecture DPX17000 Series supports master control board 1+1 redundancy, switching board N+1 redundancy, fan module 1+1 redundancy, power supply module N+M redundancy. It supports uninterrupted restart, hot fixes, separated data\/control\/monitoring planes and other technologies, ensuring 99.999% carrier-grade reliability. It supports BFD, OAM and other fast fault detection technologies, and provides a series of device-level and network-level fault detection methods.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGreen and energy efficiency\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIn response to an orthogonal architecture of service boards and switching boards, the DPX17000 Series is equipped with multiple innovative cooling technologies such as a dual air duct design, increasing heat radiation efficiency by 30%.\u003cbr\u003e\u003cbr\u003eIt is capable of performing temperature detection on key components such as service boards and switching boards. Based on the temperature and configuration of each component, it can realize intelligent fan speed regulation, reduce power consumption and environmental noise, and guarantee energy efficiency.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv id=\"content_1\" class=\"cpjs_03_c\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellspacing=\"0\" cellpadding=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX17000-A5\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX17000-A12\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX17000-A20\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e53.1Tbps\/204.8Tbps\u003c\/td\u003e\n\u003ctd\u003e88Tbps\/307.2Tbps\u003c\/td\u003e\n\u003ctd\u003e135Tbps\/387Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e8400Mpps\/48000Mpps\u003c\/td\u003e\n\u003ctd\u003e14400Mpps\/86400Mpps\u003c\/td\u003e\n\u003ctd\u003e19200Mpps\/115200Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of master control slots\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of switching boards\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e1—4\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaximum service slots\u003c\/td\u003e\n\u003ctd\u003e5\u003c\/td\u003e\n\u003ctd\u003e12\u003c\/td\u003e\n\u003ctd\u003e20\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVSM hardware cluster\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 2)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 4)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 6)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of port\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 24 GE ports, 48 GE optical interfaces, 48 GE electrical interfaces, 4 10GE ports, 8 10GE ports, 16 10GE ports, 32 10GE ports, 2 40GE ports, 12 40GE ports, 4 100GE ports, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of service board\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eiNAC, application delivery, application firewall, IoT application security control system, IPS, Unified Audit Gateway (UAG) and traffic control, anti-DDoS system, WAF, vulnerability scanning, SSL VPN, and wireless controller.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLayer-2 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eVLAN、STP、RSTP、MSTP、QinQ、灵活 QinQ、VLAN Mapping、链路聚合、跨板链VLAN, STP, RSTP, MSTP, QinQ, flexible QinQ, VLAN Mapping, link aggregation, cross-board link aggregation, cross-board port\/flow mirroring, port broadcast\/multicast\/unknown unicast forwarding storm suppression, Jumbo Frame, VLAN division based on port\/protocol\/subnet and MAC, PVLAN, GVRP, CoS priority, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLayer-3 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc IPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple L2 ~ 7 physical devices into a single L2 ~7 logical device Support OVC (OS-Level Virtual Context) 1:M virtualization technology, which performs virtualization of a single L2 ~7 physical\/logical device into multiple L2 ~ 7 logical devices Support service chain technology, which defines business streams based on L2-7 protocol features, and allows on-demand assignment of physical\/logical service modules for traffic passage Support IP-based unified management between the host and service modules and unified configuration interface\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS\/VPLS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSDN and Data Center Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 802.1Qbg and DCB Support mainstream Overlay standards such as VXLAN Support Openflow1.3 protocol\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eOther network layer features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport ACL rules including source IP, source port, destination IP, destination port, protocol number, physical port Support Ingress\/Egress CAR, 802.1P\/DSCP priority Mark\/Remark Support permit, deny, redirect, VLAN modification, mirroring and other actions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Service features of iNAC\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport Portal, 802.1x, IP\/MAC, SMS access Support non-sensing roaming to enhance users’ access experience Support policy follow-up to granular access contrl for users Support personnel traceability, ensuring accountability Support unified management of users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application delivery\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport link load balancing, server load balancing, application acceleration to ensure fast and available of applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application firewall\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport security domain division, access isolation, attack prevention, NAT, IPSec\/SSL\/L2TP VPN, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of IPS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt provides seven layers of security defense with active prevention against vulnerability exploit\/exploitation, web page tampering, and SQL injection; IPS also has a built-in professional virus library that can block various worms and viruses in real time\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eService features of UAG \u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eTraffic control: seven layers of detection, classification and control enables immediate visualization of network traffic and applications; traffic control over non-critical services such as P2P and games helps ensure bandwidth for critical services and convenient management of network bandwidth\u003cbr\u003eUnified auditing: through a detailed review of access histories and permission management of Web access, online games, stock trading, online film and television and other online behaviors, it helps ensure they meet relevant requirements and laws and regulations; with a signature library consisting of more than 5,000 network layer and application layer protocols, as well as a URL address library consisting of ten million entries, it allows refined UAG for users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of Anti-DDoS system\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCombining detection and cleaning to effectively protect metropolitan area networks and IDCs from a huge amount of DDoS attacks\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of WAF\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt supports Web application security protection, offering vulnerability protection, Web policy optimization, HTTP protocol reinforcement and other functions to ensure the availability and reliability of Web applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eServices features of wireless controllers\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 801.11ac AP and 802.11n AP Management, wireless user access control and security protection Support 802.1x, MAC address and Portal authentication; support centralized\/distributed forwarding\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport FTP, TFTP, Xmodem\u003cbr\u003eSupport Web management port, SNMP v1\/v2\/v3\u003cbr\u003eSupport RMON, NTP clock, intelligent power management\u003cbr\u003eSupport unified management platform (UMC)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Reliability\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCLOS architecture, and separated master control engine and switching boards It supports uninterrupted forwarding, Graceful Restart, hot fixes, separated data\/control\/monitoring planes and other technologies Support BFD, OAM and other fast fault detection technologies Support master control board 1+1 redundancy, switching board N+1 redundancy, fan module 1+1 redundancy, power supply module N+M redundancy Support online status monitoring protocol to perform detection of key components including master control engine, backplane, chip and storage\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e2400W\u003c\/td\u003e\n\u003ctd\u003e4800W\u003c\/td\u003e\n\u003ctd\u003e7200W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e25.8kg\u003c\/td\u003e\n\u003ctd\u003e49.1kg\u003c\/td\u003e\n\u003ctd\u003e80kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width x height x depth) (in mm)\u003c\/td\u003e\n\u003ctd\u003e442×309×480\u003c\/td\u003e\n\u003ctd\u003e442×703×480\u003c\/td\u003e\n\u003ctd\u003e442×1019×480\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8247842996514,"title":"DPX19000 Cloud Business Core","handle":"dpx19000-series","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eThe next generation Cloud business core platform, the DPX19000 Series is based on DPtech’s core technologies including APP-X hardware architecture, ConPlat operating system and APP-ID application and threat signature database. In compliance with performance, service and port requirements of networks of various sizes, it can be deployed in critical locations such as large Cloud-based data center core, and metropolitan area network convergence.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eCloud Business Core Platform\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX19000 Series is designed with a cutting-edge CLOS switching architecture, separated control plane and forwarding plane, and relatively independent master control engine and switch boards. In this way, it helps greatly improve device reliability while laying a foundation for future bandwidth upgrades.\u003cbr\u003e\u003cbr\u003eCombing switching routing and network security, the DPX19000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eDPX19000 Series is highly scalable. It supports deep service functions such as application firewall and IPS, providing powerful security protection for network core. The hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003e\u003cbr\u003eIt can provide single routing boards of million class; the connection boards support up to 24GB cache at a large caching rate of 200ms; when used with distributed ingress cache mechanism, it can meet the needs of large data centers with high burst traffic.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNon-blocking hardware cluster\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX19000 Series adopts the industry's leading non-blocking hardware cluster system. Through cluster switching boards and VSM cluster matrix, it enables non-blocking switching in strict sense without occupying any business ports. Networking through 1 + 1 back-to-back interconnection or N + M interconnection is allowed.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Service Integration Capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCombing Combing switching, network security and application delivery, the DPX19000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eDPX19000 Series is highly scalable by supporting application firewall, IPS and other service slots.\u003cbr\u003e\u003cbr\u003eThe hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003e\u003cbr\u003eWith strong network adaptability, it offers full support of QoS, IPv4\/IPv6 routing, MPLS VPN and other network services.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eL2~7 Virtualization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eRelying on VSM and OVC technologies independently developed by DPtech, the DPX19000 Series converts multiple similar service modules in a Cloud data center into a flexible scheduling resource pool, thus enabling a granular management of business platform resources and improving the utilization of resources. Automatic network management and operation solutions are enabled by UMC platform, and SDAN (Software Defined Application Network) by APP Flow or third-party interfaces.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eInnovative service chain Technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the innovative “service chain” concept, the DPX19000 Series is able to provide refined definition to data streams according to portfolio policies, customize data flow directions among various service modules, remove limitations of traffic scheduling between different service modules, and realize flexible scheduling at the business layer.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSDN and Data Center Features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX19000 Series supports mainstream Overlay standards such as VXLAN to address the issue of multi-tenancy. It offers a flexible virtual machine migration solution so as to meet users’ needs for large-scale server deployment and cross-domain connectivity in cloud computing environments. It is compatible with Openflow1.3 protocol, and offers multiple controllers and multi-level flow tables. It can serve as Openflow-hybrid to allow Openflow operations and standard Ethernet switching simultaneously.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFully redundant hardware architecture DPX19000 Series supports 1+1 redundancy of master control board.N+1 redundancy of switching board,1+1 redundancy of fan module, N+M redundancy of power supply module. It supports uninterrupted restart, hot fixes, separated data\/control\/monitoring planes and other technologies, ensuring 99.999% carrier-grade reliability. It supports BFD, OAM and other fast fault detection technologies, and provides a series of device-level and network-level fault detection methods.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGreen and energy efficiency\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIn response to an orthogonal architecture of service boards and switching boards, the DPX19000 Series is equipped with multiple innovative cooling technologies such as a dual air duct design, increasing heat radiation efficiency by 30%.\u003cbr\u003eIt is capable of performing temperature detection on key components such as service boards and switching boards. Based on the temperature and configuration of each component, it can realize intelligent fan speed regulation, and reduce power consumption and environmental noise. It improves energy efficiency with a power consumption of less than 6,000W, promoting the construction of a green network.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX19000-A6\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX19000-A10\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX19000-A18\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eSwitching capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e184Tbps\/417Tbps\u003c\/td\u003e\n\u003ctd\u003e268Tbps\/516Tbps\u003c\/td\u003e\n\u003ctd\u003e416Tbps\/1032Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e172800Mpps\u003c\/td\u003e\n\u003ctd\u003e230400Mpps\u003c\/td\u003e\n\u003ctd\u003e345600Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService processing performance (64 bytes)\u003c\/td\u003e\n\u003ctd\u003e800Gbps\u003c\/td\u003e\n\u003ctd\u003e1.6Tbps\u003c\/td\u003e\n\u003ctd\u003e3.2Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of concurrent connections\u003c\/td\u003e\n\u003ctd\u003e800 million\u003c\/td\u003e\n\u003ctd\u003e1600 million\u003c\/td\u003e\n\u003ctd\u003e3200 million\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNew connections per second\u003c\/td\u003e\n\u003ctd\u003e32 million\/second\u003c\/td\u003e\n\u003ctd\u003e64 million\/second\u003c\/td\u003e\n\u003ctd\u003e128 million\/second\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of master control slots\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of service slots\u003c\/td\u003e\n\u003ctd\u003e4\u003c\/td\u003e\n\u003ctd\u003e8\u003c\/td\u003e\n\u003ctd\u003e16\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of switching board slots\u003c\/td\u003e\n\u003ctd\u003e6\u003c\/td\u003e\n\u003ctd\u003e8\u003c\/td\u003e\n\u003ctd\u003e8\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVSM hardware cluster\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 4)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 8)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 12)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of service board\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eApplication Firewall, IPS, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTwo-layer Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eVLAN, STP, RSTP, MSTP, QinQ, flexible QinQ, VLAN Mapping, full duplex traffic control, back pressure traffic control, link aggregation, cross-board link aggregation, cross-board port\/flow mirroring, port broadcast\/multicast\/unknown unicast forwarding storm suppression, Jumbo Frame, VLAN division based on port\/protocol\/subnet and MAC, PVLAN, GVRP, CoS priority, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eThree-layer Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc IPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple L2 ~ 7 physical devices into a single L2 ~7 logical device Support OVC (OS-Level Virtual Context) 1:M virtualization technology, which performs virtualization of a single L2 ~7 physical\/logical device into multiple L2 ~ 7 logical devices Support service chain technology, which defines business streams based on L2-7 protocol features, and allows on-demand assignment of physical\/logical service modules for traffic passage Support IP-based unified management between the host and service modules and unified configuration interface\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS\/VPLS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSDN and Data Center Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 802.1Qbg, DCB, etc. Support mainstream Overlay standards such as VXLAN Support Openflow1.3 protocol\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Multicast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/ PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eOther network layer features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport ACL rules including source IP, source port, destination IP, destination port, protocol number, physical port Support Ingress\/Egress CAR, 802.1P\/DSCP priority Mark\/Remark Support permit, deny, redirect, VLAN modification, mirroring and other actions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eManagement features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport FTP, TFTP, Xmodem Support Web management port, SNMP v1\/v2\/v3 Support RMON, NTP clock, intelligent power management Support unified management platform (UMC)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eReliability\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCLOS architecture, separated master control engine and switching boards, and all boards support hot-plug Support BFD, OAM and other fast fault detection technologies Support master control board 1+1 redundancy, switching board N+1 redundancy, fan module 1+1 redundancy, power supply module N+M redundancy Support online status monitoring protocol to perform detection of key components including master control engine, backplane, chip and storage\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e8000W\u003c\/td\u003e\n\u003ctd\u003e16000W\u003c\/td\u003e\n\u003ctd\u003e24000W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e100kg\u003c\/td\u003e\n\u003ctd\u003e200kg\u003c\/td\u003e\n\u003ctd\u003e300kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width x height x depth) (in mm)\u003c\/td\u003e\n\u003ctd\u003e440x 353 x 848\u003c\/td\u003e\n\u003ctd\u003e430x 795 x 821\u003c\/td\u003e\n\u003ctd\u003e436x 1197 x 823\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=53\"\u003e\u003cem\u003e\u003cspan\u003eDPtech service chain Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=52\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Technical White Paper on OVC - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=21\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on DPtech Cloud Board - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=20\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630104635156.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPX19000 Next-generation Cloud Business Core Platform - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T20:11:09+08:00","created_at":"2023-04-27T20:11:10+08:00","vendor":"DPtech","type":"Self-Secure Networking","tags":[],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45046637855010,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"DPX19000 Cloud Business Core","public_title":null,"options":["Default Title"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX19000-Cloud-Business-Core-9467.jpg?v=1695244411"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX19000-Cloud-Business-Core-9467.jpg?v=1695244411","options":["Title"],"media":[{"alt":"DPtech DPX19000 Cloud Business Core - vnetwork","id":34459469644066,"position":1,"preview_image":{"aspect_ratio":1.0,"height":461,"width":461,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX19000-Cloud-Business-Core-9467.jpg?v=1695244411"},"aspect_ratio":1.0,"height":461,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX19000-Cloud-Business-Core-9467.jpg?v=1695244411","width":461}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eThe next generation Cloud business core platform, the DPX19000 Series is based on DPtech’s core technologies including APP-X hardware architecture, ConPlat operating system and APP-ID application and threat signature database. In compliance with performance, service and port requirements of networks of various sizes, it can be deployed in critical locations such as large Cloud-based data center core, and metropolitan area network convergence.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eCloud Business Core Platform\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX19000 Series is designed with a cutting-edge CLOS switching architecture, separated control plane and forwarding plane, and relatively independent master control engine and switch boards. In this way, it helps greatly improve device reliability while laying a foundation for future bandwidth upgrades.\u003cbr\u003e\u003cbr\u003eCombing switching routing and network security, the DPX19000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eDPX19000 Series is highly scalable. It supports deep service functions such as application firewall and IPS, providing powerful security protection for network core. The hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003e\u003cbr\u003eIt can provide single routing boards of million class; the connection boards support up to 24GB cache at a large caching rate of 200ms; when used with distributed ingress cache mechanism, it can meet the needs of large data centers with high burst traffic.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eNon-blocking hardware cluster\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX19000 Series adopts the industry's leading non-blocking hardware cluster system. Through cluster switching boards and VSM cluster matrix, it enables non-blocking switching in strict sense without occupying any business ports. Networking through 1 + 1 back-to-back interconnection or N + M interconnection is allowed.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Service Integration Capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCombing Combing switching, network security and application delivery, the DPX19000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eDPX19000 Series is highly scalable by supporting application firewall, IPS and other service slots.\u003cbr\u003e\u003cbr\u003eThe hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003e\u003cbr\u003eWith strong network adaptability, it offers full support of QoS, IPv4\/IPv6 routing, MPLS VPN and other network services.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eL2~7 Virtualization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eRelying on VSM and OVC technologies independently developed by DPtech, the DPX19000 Series converts multiple similar service modules in a Cloud data center into a flexible scheduling resource pool, thus enabling a granular management of business platform resources and improving the utilization of resources. Automatic network management and operation solutions are enabled by UMC platform, and SDAN (Software Defined Application Network) by APP Flow or third-party interfaces.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eInnovative service chain Technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the innovative “service chain” concept, the DPX19000 Series is able to provide refined definition to data streams according to portfolio policies, customize data flow directions among various service modules, remove limitations of traffic scheduling between different service modules, and realize flexible scheduling at the business layer.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSDN and Data Center Features\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eThe DPX19000 Series supports mainstream Overlay standards such as VXLAN to address the issue of multi-tenancy. It offers a flexible virtual machine migration solution so as to meet users’ needs for large-scale server deployment and cross-domain connectivity in cloud computing environments. It is compatible with Openflow1.3 protocol, and offers multiple controllers and multi-level flow tables. It can serve as Openflow-hybrid to allow Openflow operations and standard Ethernet switching simultaneously.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFully redundant hardware architecture DPX19000 Series supports 1+1 redundancy of master control board.N+1 redundancy of switching board,1+1 redundancy of fan module, N+M redundancy of power supply module. It supports uninterrupted restart, hot fixes, separated data\/control\/monitoring planes and other technologies, ensuring 99.999% carrier-grade reliability. It supports BFD, OAM and other fast fault detection technologies, and provides a series of device-level and network-level fault detection methods.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGreen and energy efficiency\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIn response to an orthogonal architecture of service boards and switching boards, the DPX19000 Series is equipped with multiple innovative cooling technologies such as a dual air duct design, increasing heat radiation efficiency by 30%.\u003cbr\u003eIt is capable of performing temperature detection on key components such as service boards and switching boards. Based on the temperature and configuration of each component, it can realize intelligent fan speed regulation, and reduce power consumption and environmental noise. It improves energy efficiency with a power consumption of less than 6,000W, promoting the construction of a green network.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX19000-A6\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX19000-A10\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX19000-A18\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eSwitching capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e184Tbps\/417Tbps\u003c\/td\u003e\n\u003ctd\u003e268Tbps\/516Tbps\u003c\/td\u003e\n\u003ctd\u003e416Tbps\/1032Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e172800Mpps\u003c\/td\u003e\n\u003ctd\u003e230400Mpps\u003c\/td\u003e\n\u003ctd\u003e345600Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService processing performance (64 bytes)\u003c\/td\u003e\n\u003ctd\u003e800Gbps\u003c\/td\u003e\n\u003ctd\u003e1.6Tbps\u003c\/td\u003e\n\u003ctd\u003e3.2Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of concurrent connections\u003c\/td\u003e\n\u003ctd\u003e800 million\u003c\/td\u003e\n\u003ctd\u003e1600 million\u003c\/td\u003e\n\u003ctd\u003e3200 million\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNew connections per second\u003c\/td\u003e\n\u003ctd\u003e32 million\/second\u003c\/td\u003e\n\u003ctd\u003e64 million\/second\u003c\/td\u003e\n\u003ctd\u003e128 million\/second\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of master control slots\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of service slots\u003c\/td\u003e\n\u003ctd\u003e4\u003c\/td\u003e\n\u003ctd\u003e8\u003c\/td\u003e\n\u003ctd\u003e16\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of switching board slots\u003c\/td\u003e\n\u003ctd\u003e6\u003c\/td\u003e\n\u003ctd\u003e8\u003c\/td\u003e\n\u003ctd\u003e8\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVSM hardware cluster\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003ctd\u003eSupported\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 4)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 8)\u003c\/td\u003e\n\u003ctd\u003eN+M redundancy (full rack: 12)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of service board\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eApplication Firewall, IPS, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eTwo-layer Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eVLAN, STP, RSTP, MSTP, QinQ, flexible QinQ, VLAN Mapping, full duplex traffic control, back pressure traffic control, link aggregation, cross-board link aggregation, cross-board port\/flow mirroring, port broadcast\/multicast\/unknown unicast forwarding storm suppression, Jumbo Frame, VLAN division based on port\/protocol\/subnet and MAC, PVLAN, GVRP, CoS priority, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eThree-layer Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc IPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple L2 ~ 7 physical devices into a single L2 ~7 logical device Support OVC (OS-Level Virtual Context) 1:M virtualization technology, which performs virtualization of a single L2 ~7 physical\/logical device into multiple L2 ~ 7 logical devices Support service chain technology, which defines business streams based on L2-7 protocol features, and allows on-demand assignment of physical\/logical service modules for traffic passage Support IP-based unified management between the host and service modules and unified configuration interface\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS\/VPLS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSDN and Data Center Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 802.1Qbg, DCB, etc. Support mainstream Overlay standards such as VXLAN Support Openflow1.3 protocol\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e Multicast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/ PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eOther network layer features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport ACL rules including source IP, source port, destination IP, destination port, protocol number, physical port Support Ingress\/Egress CAR, 802.1P\/DSCP priority Mark\/Remark Support permit, deny, redirect, VLAN modification, mirroring and other actions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eManagement features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport FTP, TFTP, Xmodem Support Web management port, SNMP v1\/v2\/v3 Support RMON, NTP clock, intelligent power management Support unified management platform (UMC)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eReliability\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCLOS architecture, separated master control engine and switching boards, and all boards support hot-plug Support BFD, OAM and other fast fault detection technologies Support master control board 1+1 redundancy, switching board N+1 redundancy, fan module 1+1 redundancy, power supply module N+M redundancy Support online status monitoring protocol to perform detection of key components including master control engine, backplane, chip and storage\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e8000W\u003c\/td\u003e\n\u003ctd\u003e16000W\u003c\/td\u003e\n\u003ctd\u003e24000W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e100kg\u003c\/td\u003e\n\u003ctd\u003e200kg\u003c\/td\u003e\n\u003ctd\u003e300kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width x height x depth) (in mm)\u003c\/td\u003e\n\u003ctd\u003e440x 353 x 848\u003c\/td\u003e\n\u003ctd\u003e430x 795 x 821\u003c\/td\u003e\n\u003ctd\u003e436x 1197 x 823\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=53\"\u003e\u003cem\u003e\u003cspan\u003eDPtech service chain Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=52\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Technical White Paper on OVC - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=21\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on DPtech Cloud Board - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1184\u0026amp;id=20\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630104635156.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPX19000 Next-generation Cloud Business Core Platform - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8247853220130,"title":"DPX8000 Security Network Core L2-7","handle":"dpx8000-series","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eBased on DPtech’s core technologies including APP-X hardware architecture, ConPlat operating system and APP-ID application and threat signature database, the DPX8000 Series offers an integration of switching, network security, and application delivery. DPX8000 Series is designed to meet the needs of high performance deep service processing from operators, data centers, and large enterprises. In addition to IPv4\/IPv6, MPLS VPN, loopfree and other network features, its deep service wire-speed processing capabilities include iNAC, application delivery, application firewall, IoT application security control, IPS, Unified Audit Gateway (UAG), anti-DDoS system, WAF, and vulnerability scanning.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSecurity Network Core\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eDPX8000 Series is compatible with 40GE and 100GE Ethernet standards. With high performance service boards, the entire unit supports a maximum of 12 expansion slots, providing comprehensive integration capabilities.\u003cbr\u003eDPX8000 Series makes an innovative progress from network security to security network. Moreover, the traditional blacklist mechanism has evolved to the whitelist concept centered on management and control.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eL2~7 Virtualization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eRelying on VSM and OVC technologies independently developed by DPtech, the DPX8000 Series converts multiple similar service modules into a flexible scheduling resource pool, thus enabling a granular management of business platform resources and improving the utilization of resources. In conjunction with UMC management platform, it provides users with automatic management and operation and maintenance solutions.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Service Integration Capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCombing switching\u0026amp;routing, network security and application delivery, the DPX8000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eWith a series of rich business scalability capabilities, the DPX8000 Series provides more than 10 service slots including iNAC, application delivery, application firewall, IPS, traffic control, anti-DDoS system, WAF, vulnerability scanning, and wireless controller.\u003cbr\u003eThe hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003eWith strong network adaptability, it offers full support of QoS, IPv4\/IPv6 routing, MPLS VPN and other network services.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eInnovative service chain Technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the innovative “service chain” concept, the DPX8000 Series is able to provide refined definition to data streams according to portfolio policies, customize data flow directions among various service modules, remove limitations of traffic scheduling between different service modules, and realize flexible scheduling at the business layer.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eDPX8000 Series is provided with master redundancy, N+1 power, uninterrupted restart, hot fixes, separated data\/control\/monitoring planes and other technologies, ensuring 99.999% carrier-grade reliability. It supports BFD, OAM and other fast fault detection technologies, and provides a series of device-level and network-level fault detection methods.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGreen and energy efficiency\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eDPX8000 Series is equipped with multiple innovative cooling technologies such as a dual air duct design, increasing heat radiation efficiency by 30%. It is capable of performing temperature detection on key components such as service boards and switching boards. Based on the temperature and configuration of each component, it can realize intelligent fan speed regulation, reduce power consumption and environmental noise, and guarantee energy efficiency.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003ePX8000-A3\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX8000-A5\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX8000-A12\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e20.6Tbps\/50.8Tbps\u003c\/td\u003e\n\u003ctd\u003e27.6Tbps\/104.8Tbps\u003c\/td\u003e\n\u003ctd\u003e59.35Tbps\/236.33Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e3840Mpps\/24400Mpps\u003c\/td\u003e\n\u003ctd\u003e4800Mpps\/30000Mpps\u003c\/td\u003e\n\u003ctd\u003e11520Mpps\/72000Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBusiness processing capabilities\u003c\/td\u003e\n\u003ctd\u003e80 Gbps\u003c\/td\u003e\n\u003ctd\u003e160 Gbps\u003c\/td\u003e\n\u003ctd\u003e400 Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaster control slot\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of service slots\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e4\u003c\/td\u003e\n\u003ctd\u003e10\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eRedundant AC\/DC Power Supply\u003c\/td\u003e\n\u003ctd\u003eRedundant AC\/DC Power Supply\u003c\/td\u003e\n\u003ctd\u003eRedundant AC\/DC Power Supply\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of switching boards\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e1-2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of port\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 24-port GE interfaces, 48-port GE optical interfaces, 48-port GE electrical interfaces, 4-port 10GE interfaces, 8-port 10GE interfaces, 32-port 10GE interfaces, 2-port 40GE interfaces, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of service board\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eiNAC, application delivery, application firewall, IoT application security control system, IPS, Unified Audit Gateway (UAG) and traffic control, anti-DDoS system, WAF, vulnerability scanning, and wireless controller.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eLayer-2 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eVLAN, STP, RSTP, MSTP, QinQ, flexible QinQ, VLAN Mapping, full duplex traffic control, back pressure traffic control, link aggregation (support 128 aggregation groups, with each group consisting of 8 members), cross-board link aggregation, cross-board port\/flow mirroring, port broadcast\/multicast\/unknown unicast forwarding storm suppression, Jumbo Frame, VLAN division based on port\/protocol\/subnet and MAC, PVLAN, GVRP, CoS priority, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLayer-3 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc\u003cbr\u003eIPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple L2 ~ 7 physical devices into a single L2 ~7 logical device Support OVC (OS-Level Virtual Context) 1:M virtualization technology, which performs virtualization of a single L2 ~7 physical\/logical device into multiple L2 ~ 7 logical devices Support service chain technology, which defines business streams based on L2-7 protocol features, and allows on-demand assignment of physical\/logical service modules for traffic passage Support IP-based unified management between the host and service modules and unified configuration interface\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSDN and Data Center Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 802.1Qbg and DCB\u003cbr\u003eSupport mainstream Overlay standards such as VXLAN\u003cbr\u003eSupport Openflow1.3 protocol\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS\/VPLS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS QoS, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eOther network layer features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport ACL rules including source IP, source port, destination IP, destination port, protocol number, physical port Support Ingress\/Egress CAR, 802.1P\/DSCP priority Mark\/Remark\u003cbr\u003eSupport permit, deny, redirect, VLAN modification, mirroring and other actions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eService features of iNAC\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport Portal, 802.1x, IP\/MAC, SMS access\u003cbr\u003eSupport non-sensing roaming to enhance users’ access experience\u003cbr\u003eSupport policy follow-up to granular access contrl for users\u003cbr\u003eSupport personnel traceability, ensuring accountability\u003cbr\u003eSupport unified management of users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application delivery\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport link load balancing, server load balancing, application acceleration to ensure fast and available of applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application firewall\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport security domain division, access isolation, attack prevention, NAT, IPSec\/SSL\/L2TP VPN, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of IPS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt provides seven layers of security defense with active prevention against vulnerability exploit\/exploitation, web page tampering, and SQL injection; IPS also has a built-in professional virus library that can block various worms and viruses in real time\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of UAG\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eTraffic control: seven layers of detection, classification and control enables immediate visualization of network traffic and applications; traffic control over non-critical services such as P2P and games helps ensure bandwidth for critical services and convenient management of network bandwidth Unified auditing: through a detailed review of access histories and permission management of Web access, online games, stock trading, online film and television and other online behaviors, it helps ensure they meet relevant requirements and laws and regulations; with a signature library consisting of more than 5,000 network layer and application layer protocols, as well as a URL address library consisting of ten million entries, it allows refined UAG for users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of Anti-DDoS system\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCombining detection and cleaning to effectively protect metropolitan area networks and IDCs from a huge amount of DDoS attacks\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of WAF\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt supports Web application security protection, offering vulnerability protection, Web policy optimization, HTTP protocol reinforcement and other functions to ensure the availability and reliability of Web applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eServices features of wireless controllers\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e802.11 a\/b\/g AP and 802.11n AP Management, wireless user access control and security protection\u003cbr\u003eSupport 802.1x, MAC address and Portal authentication; support centralized\/distributed forwarding\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport FTP, TFTP, Xmodem\u003cbr\u003eSupport Web management port, SNMP v1\/v2\/v3\u003cbr\u003eSupport RMON, NTP clock, intelligent power management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eReliability\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport master control board 1+1 redundancy\u003cbr\u003eSupport power N+1 redundancy\u003cbr\u003ePassive backplane design; all boards support hot-plug\u003cbr\u003eSupport online status monitoring protocol to perform detection of key components including master control engine, backplane, chip and storage\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e2400W\u003c\/td\u003e\n\u003ctd\u003e2400W\u003c\/td\u003e\n\u003ctd\u003e4800W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e27kg\u003c\/td\u003e\n\u003ctd\u003e45kg\u003c\/td\u003e\n\u003ctd\u003e95kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width x height x depth) (in mm)\u003c\/td\u003e\n\u003ctd\u003e436 x 178 x 480\u003c\/td\u003e\n\u003ctd\u003e436 x 283 x 480\u003c\/td\u003e\n\u003ctd\u003e436 x 666 x 480\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e\u003cbr\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=42\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=36\"\u003e\u003cem\u003e\u003cspan\u003eDPtech service chain Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=35\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Technical White Paper on OVC - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=25\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on DPtech Cloud Board - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=24\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630104906742.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPX8000 Deep Service Switching Gateway - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=42\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=36\"\u003e\u003cem\u003e\u003cspan\u003eDPtech service chain Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=35\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Technical White Paper on OVC - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=25\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on DPtech Cloud Board - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=24\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630104906742.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPX8000 Deep Service Switching Gateway - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e","published_at":"2023-04-27T20:28:02+08:00","created_at":"2023-04-27T20:28:02+08:00","vendor":"DPtech","type":"Self-Secure Networking","tags":[],"price":0,"price_min":0,"price_max":0,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":45074647351586,"title":"PX8000-A3","option1":"PX8000-A3","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"DPX8000 Security Network Core L2-7 - PX8000-A3","public_title":"PX8000-A3","options":["PX8000-A3"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074647384354,"title":"DPX8000-A5","option1":"DPX8000-A5","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"DPX8000 Security Network Core L2-7 - DPX8000-A5","public_title":"DPX8000-A5","options":["DPX8000-A5"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""},{"id":45074647417122,"title":"DPX8000-A12","option1":"DPX8000-A12","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"DPX8000 Security Network Core L2-7 - DPX8000-A12","public_title":"DPX8000-A12","options":["DPX8000-A12"],"price":0,"weight":0,"compare_at_price":null,"inventory_management":"shopify","barcode":""}],"images":["\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX8000-Security-Network-Core-L2-7-282.jpg?v=1695244417"],"featured_image":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX8000-Security-Network-Core-L2-7-282.jpg?v=1695244417","options":["Models"],"media":[{"alt":"DPtech DPX8000 Security Network Core L2-7 - vnetwork","id":34459469709602,"position":1,"preview_image":{"aspect_ratio":1.0,"height":455,"width":455,"src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX8000-Security-Network-Core-L2-7-282.jpg?v=1695244417"},"aspect_ratio":1.0,"height":455,"media_type":"image","src":"\/\/v-network.net\/cdn\/shop\/products\/DPtech-DPX8000-Security-Network-Core-L2-7-282.jpg?v=1695244417","width":455}],"content":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eBased on DPtech’s core technologies including APP-X hardware architecture, ConPlat operating system and APP-ID application and threat signature database, the DPX8000 Series offers an integration of switching, network security, and application delivery. DPX8000 Series is designed to meet the needs of high performance deep service processing from operators, data centers, and large enterprises. In addition to IPv4\/IPv6, MPLS VPN, loopfree and other network features, its deep service wire-speed processing capabilities include iNAC, application delivery, application firewall, IoT application security control, IPS, Unified Audit Gateway (UAG), anti-DDoS system, WAF, and vulnerability scanning.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT FEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eSecurity Network Core\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eDPX8000 Series is compatible with 40GE and 100GE Ethernet standards. With high performance service boards, the entire unit supports a maximum of 12 expansion slots, providing comprehensive integration capabilities.\u003cbr\u003eDPX8000 Series makes an innovative progress from network security to security network. Moreover, the traditional blacklist mechanism has evolved to the whitelist concept centered on management and control.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eL2~7 Virtualization\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eRelying on VSM and OVC technologies independently developed by DPtech, the DPX8000 Series converts multiple similar service modules into a flexible scheduling resource pool, thus enabling a granular management of business platform resources and improving the utilization of resources. In conjunction with UMC management platform, it provides users with automatic management and operation and maintenance solutions.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFull Service Integration Capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eCombing switching\u0026amp;routing, network security and application delivery, the DPX8000 Series becomes the first to realize the deep integration of layers 2 ~ 7. All service modules in a single device can be managed based on a single IP, making it simple to establish complex networking.\u003cbr\u003e\u003cbr\u003eWith a series of rich business scalability capabilities, the DPX8000 Series provides more than 10 service slots including iNAC, application delivery, application firewall, IPS, traffic control, anti-DDoS system, WAF, vulnerability scanning, and wireless controller.\u003cbr\u003eThe hot elastic service expansion technology can made dynamic adjustments to service modules without restarting the device, enabling plug-and-play on-demand deployment of services.\u003cbr\u003eWith strong network adaptability, it offers full support of QoS, IPv4\/IPv6 routing, MPLS VPN and other network services.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eInnovative service chain Technology\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eBased on the innovative “service chain” concept, the DPX8000 Series is able to provide refined definition to data streams according to portfolio policies, customize data flow directions among various service modules, remove limitations of traffic scheduling between different service modules, and realize flexible scheduling at the business layer.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ecarrier-grade High Reliability\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eDPX8000 Series is provided with master redundancy, N+1 power, uninterrupted restart, hot fixes, separated data\/control\/monitoring planes and other technologies, ensuring 99.999% carrier-grade reliability. It supports BFD, OAM and other fast fault detection technologies, and provides a series of device-level and network-level fault detection methods.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eGreen and energy efficiency\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eDPX8000 Series is equipped with multiple innovative cooling technologies such as a dual air duct design, increasing heat radiation efficiency by 30%. It is capable of performing temperature detection on key components such as service boards and switching boards. Based on the temperature and configuration of each component, it can realize intelligent fan speed regulation, reduce power consumption and environmental noise, and guarantee energy efficiency.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"wrap cpjs_03\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cem\u003e\u003ci\u003e\u003c\/i\u003e\u003c\/em\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003ePRODUCT SPECIFICATION\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"in_01\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv class=\"cpjs_03_c\" id=\"content_1\"\u003e\n\u003cdiv class=\"table_div\"\u003e\n\u003ctable cellpadding=\"0\" cellspacing=\"0\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003cth\u003e\u003cstrong\u003eProduct Model\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003ePX8000-A3\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX8000-A5\u003c\/strong\u003e\u003c\/th\u003e\n\u003cth\u003e\u003cstrong\u003eDPX8000-A12\u003c\/strong\u003e\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSwitching capacity\u003c\/td\u003e\n\u003ctd\u003e20.6Tbps\/50.8Tbps\u003c\/td\u003e\n\u003ctd\u003e27.6Tbps\/104.8Tbps\u003c\/td\u003e\n\u003ctd\u003e59.35Tbps\/236.33Tbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePacket forwarding rate\u003c\/td\u003e\n\u003ctd\u003e3840Mpps\/24400Mpps\u003c\/td\u003e\n\u003ctd\u003e4800Mpps\/30000Mpps\u003c\/td\u003e\n\u003ctd\u003e11520Mpps\/72000Mpps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eBusiness processing capabilities\u003c\/td\u003e\n\u003ctd\u003e80 Gbps\u003c\/td\u003e\n\u003ctd\u003e160 Gbps\u003c\/td\u003e\n\u003ctd\u003e400 Gbps\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMaster control slot\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of service slots\u003c\/td\u003e\n\u003ctd\u003e2\u003c\/td\u003e\n\u003ctd\u003e4\u003c\/td\u003e\n\u003ctd\u003e10\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply\u003c\/td\u003e\n\u003ctd\u003eRedundant AC\/DC Power Supply\u003c\/td\u003e\n\u003ctd\u003eRedundant AC\/DC Power Supply\u003c\/td\u003e\n\u003ctd\u003eRedundant AC\/DC Power Supply\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eNumber of switching boards\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e1-2\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of port\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 24-port GE interfaces, 48-port GE optical interfaces, 48-port GE electrical interfaces, 4-port 10GE interfaces, 8-port 10GE interfaces, 32-port 10GE interfaces, 2-port 40GE interfaces, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eType of service board\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eiNAC, application delivery, application firewall, IoT application security control system, IPS, Unified Audit Gateway (UAG) and traffic control, anti-DDoS system, WAF, vulnerability scanning, and wireless controller.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eLayer-2 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eVLAN, STP, RSTP, MSTP, QinQ, flexible QinQ, VLAN Mapping, full duplex traffic control, back pressure traffic control, link aggregation (support 128 aggregation groups, with each group consisting of 8 members), cross-board link aggregation, cross-board port\/flow mirroring, port broadcast\/multicast\/unknown unicast forwarding storm suppression, Jumbo Frame, VLAN division based on port\/protocol\/subnet and MAC, PVLAN, GVRP, CoS priority, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eLayer-3 Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIPv4: Static routing, RIP v1\/2, OSPF, BGP, policy-go-together, etc\u003cbr\u003eIPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eVirtualization features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport VSM (Virtual Switching Matrix) N:1 virtualization technology, which performs virtualization of multiple L2 ~ 7 physical devices into a single L2 ~7 logical device Support OVC (OS-Level Virtual Context) 1:M virtualization technology, which performs virtualization of a single L2 ~7 physical\/logical device into multiple L2 ~ 7 logical devices Support service chain technology, which defines business streams based on L2-7 protocol features, and allows on-demand assignment of physical\/logical service modules for traffic passage Support IP-based unified management between the host and service modules and unified configuration interface\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eSDN and Data Center Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport 802.1Qbg and DCB\u003cbr\u003eSupport mainstream Overlay standards such as VXLAN\u003cbr\u003eSupport Openflow1.3 protocol\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS\/VPLS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMPLS Features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport L3 MPLS VPN, VPLS, VLL, hierarchical VPLS, QinQ+VPLS access, P\/PE, LDP, MPLS QoS, MPLS OAM, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eMulticast features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport IGMPv1\/v2\/v3, IGMPv1\/v2\/v3 Snooping, PIM-SM\/PIM-DM\/PIM-SSM\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eOther network layer features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport ACL rules including source IP, source port, destination IP, destination port, protocol number, physical port Support Ingress\/Egress CAR, 802.1P\/DSCP priority Mark\/Remark\u003cbr\u003eSupport permit, deny, redirect, VLAN modification, mirroring and other actions\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eService features of iNAC\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport Portal, 802.1x, IP\/MAC, SMS access\u003cbr\u003eSupport non-sensing roaming to enhance users’ access experience\u003cbr\u003eSupport policy follow-up to granular access contrl for users\u003cbr\u003eSupport personnel traceability, ensuring accountability\u003cbr\u003eSupport unified management of users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application delivery\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport link load balancing, server load balancing, application acceleration to ensure fast and available of applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of application firewall\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport security domain division, access isolation, attack prevention, NAT, IPSec\/SSL\/L2TP VPN, etc.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of IPS\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt provides seven layers of security defense with active prevention against vulnerability exploit\/exploitation, web page tampering, and SQL injection; IPS also has a built-in professional virus library that can block various worms and viruses in real time\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of UAG\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eTraffic control: seven layers of detection, classification and control enables immediate visualization of network traffic and applications; traffic control over non-critical services such as P2P and games helps ensure bandwidth for critical services and convenient management of network bandwidth Unified auditing: through a detailed review of access histories and permission management of Web access, online games, stock trading, online film and television and other online behaviors, it helps ensure they meet relevant requirements and laws and regulations; with a signature library consisting of more than 5,000 network layer and application layer protocols, as well as a URL address library consisting of ten million entries, it allows refined UAG for users\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of Anti-DDoS system\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eCombining detection and cleaning to effectively protect metropolitan area networks and IDCs from a huge amount of DDoS attacks\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eService features of WAF\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eIt supports Web application security protection, offering vulnerability protection, Web policy optimization, HTTP protocol reinforcement and other functions to ensure the availability and reliability of Web applications\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eServices features of wireless controllers\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003e802.11 a\/b\/g AP and 802.11n AP Management, wireless user access control and security protection\u003cbr\u003eSupport 802.1x, MAC address and Portal authentication; support centralized\/distributed forwarding\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eManagement features\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport FTP, TFTP, Xmodem\u003cbr\u003eSupport Web management port, SNMP v1\/v2\/v3\u003cbr\u003eSupport RMON, NTP clock, intelligent power management\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003e\n\u003cbr\u003eReliability\u003c\/td\u003e\n\u003ctd colspan=\"3\"\u003eSupport master control board 1+1 redundancy\u003cbr\u003eSupport power N+1 redundancy\u003cbr\u003ePassive backplane design; all boards support hot-plug\u003cbr\u003eSupport online status monitoring protocol to perform detection of key components including master control engine, backplane, chip and storage\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003ePower supply capacity as a whole unit\u003c\/td\u003e\n\u003ctd\u003e2400W\u003c\/td\u003e\n\u003ctd\u003e2400W\u003c\/td\u003e\n\u003ctd\u003e4800W\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eWeight\u003c\/td\u003e\n\u003ctd\u003e27kg\u003c\/td\u003e\n\u003ctd\u003e45kg\u003c\/td\u003e\n\u003ctd\u003e95kg\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"td1\"\u003eDimension (width x height x depth) (in mm)\u003c\/td\u003e\n\u003ctd\u003e436 x 178 x 480\u003c\/td\u003e\n\u003ctd\u003e436 x 283 x 480\u003c\/td\u003e\n\u003ctd\u003e436 x 666 x 480\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cem\u003e\u003cbr\u003e*These specifications apply only to DPtech products available on the international market.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=42\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=36\"\u003e\u003cem\u003e\u003cspan\u003eDPtech service chain Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=35\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Technical White Paper on OVC - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=25\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on DPtech Cloud Board - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=24\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630104906742.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPX8000 Deep Service Switching Gateway - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003cbr\u003e\u003c\/p\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eRELATED RESOURCES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_07_c\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=42\"\u003e\u003cem\u003e\u003cspan\u003eFast Ring Network Recovery Protocol (FRRP) Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=36\"\u003e\u003cem\u003e\u003cspan\u003eDPtech service chain Technical White Paper - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=35\"\u003e\u003cem\u003e\u003cspan\u003eDPtech Technical White Paper on OVC - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=25\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on DPtech Cloud Board - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/index.php?m=content\u0026amp;c=index\u0026amp;a=show\u0026amp;catid=1200\u0026amp;id=24\"\u003e\u003cem\u003e\u003cspan\u003eTechnical White Paper on VSM - \u003c\/span\u003e\u003ci\u003eTECHNICAL WHITE PAPER\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca href=\"https:\/\/www.dptech.com\/uploadfile\/2020\/0630\/20200630104906742.pdf\" target=\"_blank\"\u003e\u003cem\u003e\u003cspan\u003eDPX8000 Deep Service Switching Gateway - \u003c\/span\u003e\u003ci\u003eDATA SHEET\u003c\/i\u003e\u003c\/em\u003e\u003c\/a\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e"},{"id":8254196416802,"title":"LSW2300 Series Industrial Switches","handle":"lsw2300-series-industrial-switches","description":"\u003cp\u003e\u003cmeta charset=\"UTF-8\"\u003e\u003cspan\u003eDPtech LSW2300 Series industrial switches are specially designed to meet the requirements of industrial systems such as substation automation systems, distribution network automation, and intelligent transportation. To address the actual needs of industrial applications, the DPtech industrial switches can realize real-time communication, network security, intrinsic safety and safety explosion-proof. Compared with commercial switches, industrial switches have more stringent requirements for design and selection of components, to ensure they can work properly in harsh environments.\u003cbr\u003e\u003c\/span\u003e\u003cbr\u003e\u003cspan\u003eAs most traditional industrial switches are developed in open-source operating systems based on industrial automation, it is inevitable that they have a large number of vulnerabilities and defects derived from the open-source systems, such as low reliability, poor compatibility for large and new Ethernet protocols, and failure in meeting increasingly complex industrial networking requirements. Based on in-depth understanding of the needs of various industrial scenarios, DPtech launched the next generation LSW2300 Series industrial switches in compliance with numerous standards and specifications. Based on DPtech’s ConPlat software platform, the LSW2300 Series industrial switches provide seamless integration with traditional enterprise networks by offering compatibility with rich L2-L4 network protocols, including VLAN, STP\/RSTP\/MSTP, QoS,STP\/RSTP\/MSTP, QoS, traffic control, ACL, and port mirroring. With a fanless heat dissipation circuit design, the Series provides a wide range of operating temperatures between -40 and 85ºC. Other industrial qualities include vibration resistance, shock resistance, high\/low temperature resistance, corrosion resistance, dust proof, and pulsed magnetic field immunity. Besides, the compatibility with rich network protocols for routers, switches and security helps improve its networking capability and enhance the reliability and security of industrial networks. The rich features and robust hardware design of LSW2300 Series enable its wide application in substations, distribution network intelligent transformation, factory automation, intelligent transportation, and other harsh application environments.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cdiv class=\"wrap cpjs_02\"\u003e\n\u003cdiv class=\"wrap_c\"\u003e\n\u003cdiv class=\"in_01\"\u003e\u003cstrong\u003eFEATURES\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv class=\"cpjs_02_c1\"\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eIndustrial-grade hardware standards\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eFollow industrial-grade design specifications, strictly control component selection, and adopt dual-power redundant design;\u003c\/p\u003e\n\u003cp\u003eSupport -40~85ºC working environment temperature. Meet EMC4 protection standards, provide impact resistance, anti-jamming, anti-shock, anti-dust, anti-corrosion and other protective capabilities to ensure stable operation in various harsh environments;\u003c\/p\u003e\n\u003cp\u003eUsing fanless design, heat conduction and heat dissipation technology;\u003c\/p\u003e\n\u003cp\u003eThe equipment can run on average for more than 35 years without failure.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eFlexible deployment capabilities\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eUsing din rail design, it can be easily stuck on the rail without fixing with screws, easy to maintain;\u003c\/p\u003e\n\u003cp\u003eSupport VLAN, STP\/RSTP, multicast, port mirroring, QoS and other layer 2 features, fully support IPv6, and provide a smooth transition capability for future network upgrades.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003ePoE\/PoE+\/PoE++\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003ePower supply for PoE \/PoE+ \/ PoE ++;\u003c\/p\u003e\n\u003cp\u003eSupport PoE watchdog function, can realize automatic power off and restart.\u003c\/p\u003e\n\u003c\/a\u003e\u003c\/li\u003e\n\u003cli\u003e\u003ca\u003e\u003cem class=\"\"\u003e\u003cspan class=\"sp1\"\u003e\u003ci\u003eRedundant networking mechanism\u003c\/i\u003e\u003c\/span\u003e\u003cspan class=\"sp2\"\u003e\u003c\/span\u003e\u003c\/em\u003e\n\u003cp\u003eIndependently developed FRRP fast ring network recovery protocol, which can achieve millisecond-level network failure switching;\u003c