20 Km Optical Line Terminal Equipment Core 10Ge Routing Switch Chassis Anti DOS Attack EL5600-06 - EL5600-06

20 Km Optical Line Terminal Equipment Core 10Ge Routing Switch Chassis Anti DOS Attack EL5600-06 For Sale, Most Competitive Price, Fast Delivery, Custom Service, Wholesale 20 Km Optical Line Terminal Equipment Core 10Ge Routing Switch Chassis Anti DOS Attack EL5600-06, Made in China, High Quality Products!, China cheap prodocuts, china suppliers Supplier, Manufacturer.
20 Km Optical Line Terminal Equipment Core 10Ge Routing Switch Chassis Anti DOS Attack EL5600-06

20 Km Optical Line Terminal Equipment Core 10Ge Routing Switch Chassis Anti DOS Attack EL5600-06

?

Overview

EL5600-06 OLT is a high performed, high density and module OLT which is for the demands as fiber accessing of the last 1km to the telecom operators, customer broadband accessing solution, innovation of bidirectional HFC network and triple play (HD video monitoring transmission with voice and video integrated access) of government, police and large-scale enterprise.?

?

?

Business Features

- - - -
Item | EL5600-06 |
PON features ? | IEEE 802.3ah EPON China Telecom/Unicom GEPON PON transmission distance can reach 20 Km; Each PON port supports the max. 1:64 division ratio; Uplink and downlink triple churning encrypted function with 128Bits ONU terminal legitimacy certification, report illegal ONU registration DBA algorithm, the particle is 64Kbit/s Standard OAM and extended OAM ONU batch software upgrade, fixed time upgrade, real time upgrade PON transmit and inspect receiving optical power |
L2 features ? | MAC | MAC Black Hole Port MAC Limit |
VLAN | 4K VLAN entries Port-based/MAC-based/IP subnet-based VLAN VLAN Swap and VLAN Remark PVLAN to realize port isolation and saving public-vlan resources GVRP |
Spanning tree | STP/RSTP/MSTP Remote loop detecting |
Port | Bi-directional bandwidth control Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring and traffic mirroring |
Security features | User’s security | Anti-ARP-spoofing Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation IP Source Guard create IP+VLAN+MAC+Port binding IEEE 802.1x and AAA/Radius authentication |
Device security | Anti-DOS attack(such as ARP,Synflood, Smurf, ICMP attack), ARP detection, worm and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP login through Telnet Hierarchical management and password protection of users |
Network security | User-based MAC and ARP traffic examination Restrict ARP traffic of each user and force-out user with abnormal ARP traffic Dynamic ARP table-based binding Supports IP+VLAN+MAC+Port binding L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet Port-based broadcast/multicast suppression and auto-shutdown risk port URPF to prevent IP address counterfeit and attack DHCP Option82 and PPPoE+ upload user’s physical location Plaintext authentication of OSPF,RIPv2 and BGPv4 packets and MD5 cryptograph authentication |
IP routing | IPv4 | ARP Proxy DHCP Relay DHCP Server Static route RIPv1/v2 OSPFv2 BGPv4 Strategy route Route policy |
Service features | ACL | Standard and extended ACL Time Range ACL Packet filter providing filtering based on source/destination MAC address, source/destination IP address, port, protocol, VLAN, VLAN range, MAC address range, or invalid frame. System supports concurrent identification at most 50 service traffic Support packet filtration of L2~L7 even deep to 80 bytes of IP packet head |
QoS | Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color monitor of self-defined flow Priority remark to port or self-defined flow and provide 802.1P, DSCP priority and Remark CAR(Committed Access Rate),Traffic Shaping and flow statistics Packet mirror and redirection of interface and self-defined flow Super queue scheduler based on port and self-defined flow. Each port/ flow supports 8 priority queues and scheduler of SP, WRR and SP+WRR. Congestion avoid mechanism,including Tail-Drop and WRED |
Multicast | IGMPv1/v2/v3 IGMPv1/v2/v3 Snooping IGMP Filter MVR and cross VLAN multicast copy IGMP Fast leave IGMP Proxy PIM-SM/PIM-DM/PIM-SSM PIM-SMv6,PIM-DMv6,PIM-SSMv6 MLDv2/MLDv2 Snooping |
Reliability | Loop protection | EAPS and GERP (recover-time <50ms) Loopback-detection |
Link protection | FlexLink (recover-time <50ms) RSTP/MSTP (recover-time <1s) LACP (recover-time <10ms) BFD |
Device protection | VRRP host backup Double fault-tolerant backup of host program and configuration files 1+1 power hot backup Fan redundancy |
Maintenance | Network maintenance | Port real-time, utilization and transmit/receive statistic based on Telnet port RFC3176 sFlow analysis LLDP 802.3ah Ethernet OAM RFC 3164 BSD syslog Protocol Ping and Traceroute |
Device management | CLI, Console port, Telnet and WEB SNMPv1/v2/v3 RMON (Remote Monitoring)1,2,3,9 groups MIB NTP GN.LinkⅡ Server NGBNView network management |
- - - -
?
?

Get Quote

GCOM Technologies Co., Ltd

Address: B-Building, SEI Optical Park, #2 Songpingshan Rd, North Hi-Tech Industry Park, Nanshan, Shenzhen, China, Shenzhen, Guangdong, China, 518000
Tel: 86-755-26981515
Shenzhen GCOM Technologies Co.,Ltd was jointly founded by the domestic experienced marketing, research and development, and management personnels in the field of communication and Futong Group.

Related Products

Send A Message
*If you are interested in our products and want to know more details,please leave a message here,we will reply you as soon as we can.