Overview

TR-S2528-P

TR-S2500-POE Series is a new-generation smart access switch designed for carrier’s IP MAN and enterprise networks. Based on the new-generation high-performance hardware and TRROS platform, it supports functions such as ACL, QinQ and QoS. TR-S2500-POE Series have 4 models: TR-S2510-P, TR-S2518-P, TR-S2528-P and TR-S2528-P-800

Specification

TR-S2500-POE Series

Item

TR-S2510-P

TR-S2518-P

TR-S2528-P

TR-S2528-P-800

Switching capacity

20Gbps

64Gbps

64Gbps

64Gbps

Forwarding rate

15Mpps

27Mpps

42Mpps

42Mpps

Dimensions mm (W×D×H)

340x200x44

442x315x44

440×280×44

440×280×44

Power

consumption

<30W

<45W

<45W

<45W

Power supply

AC: 100V-240V, 50Hz±10%

DC: -36V~-72V (The POE switch here doesn’t support DC power supply)

Environment

Operating temperature/humidity: 0℃-50℃, 10%-90% non-condensing

Storage temperature/ humidity: -20℃-70℃; 5%-95% non-condensing

MAC switching function

Static configuration and dynamically learning of MAC address

Check and delete MAC address

Configuring of MAC address aging time

Limit on MAC address learning number

MAC address filtering function

VLAN

4K VLAN entries

GVRP

1:1 and N:1 VLAN Mapping

QinQ

Private VLAN

STP

802.1D (STP), 802.1W (RSTP), 802.1S (MSTP)

BPDU protection, root protection and ring protection

Multicast

IGMP v1/v2/v3

IGMP Snooping

IGMP Fast Leave

Multicast group policy and multicast number limit

Multicast traffic cross VLAN duplication

IPv4

Static routing

IPv6

ICMPv6, DHCPv6 and IPv6 Telnet

IPv6 Neighbor Discovery

MLD v1/v2

MLD Snooping

QoS

Traffic classification of each field of L2/L3/L4 protocol headers

CAR traffic control

802.1P/DSCP priority remark

Multiple queuing algorithms such as SP, WRR or SP+WRR

Tail-Drop, WRED

Traffic supervision and traffic shaping

Security features

Identification and filtering of L2/L3/L4 based ACL

Defend against DDoS attack, SYN Flood attack of TCP or UDP Flood attack

Suppression of broadcast, multicast and unknown unicast packet

Port isolation

Port security, IP+MAC+port binding

DHCP Snooping, DHCP Option 82

IEEE 802.1x authentication

Radius and TRTacacs+ authentication

Command line authority control based on user levels

Reliability

Static/LACP link aggregation

EAPS and ERPS(single ring)

ISSU

Management and Maintenance

Console, Telnet, SSH 2.0

WEB based management style

SNMP v1/v2/v3

Upload and download of TFTP files

RMON

File-Name Download
01-Basic Configuration Commands.pdf
Download
02-Network Management Configuration Commands.pdf
Download
03-Security Configuration Commands.pdf
Download
04-WEB Configuration Commands.pdf
Download
05-Interface Configuration Commands.pdf
Download
06-Interface Range Commands.pdf
Download
07-Port Physical Characteristic Configuration Commands.pdf
Download
08-Port Additional Characteristics Configuration Commands.pdf
Download
09-Port Mirroring Configuration Commands.pdf
Download
11-MAC Address Configuration Commands.pdf
Download
12-MAC Access List Configuration Commands.pdf
Download
13-802.1x Configuration Commands.pdf
Download
14-VLAN Configuration Commands.pdf
Download
15-GVRP Configuration Commands.pdf
Download
16-STP Configuration Commands.pdf
Download
17-STP Optional Characteristic Configuration Commands.pdf
Download
18-Link Aggregation Configuration Commands.pdf
Download
20-LLDP Configuration Commands.pdf
Download
21-Backuplink Configuration Commands.pdf
Download
22-ERPS Configuration Commands.pdf
Download
23-MEAPS Configuration Commands.pdf
Download
24-UDLD Configuration Commands.pdf
Download
25-IGMP-snooping Configuration Commands.pdf
Download
26-MLD-Snooping Configuration Commands.pdf
Download
27-OAM Configuration Commands.pdf
Download
28-CFM and Y1731 Configuration Commands.pdf
Download
29-DHCP-snooping Configuration Commands.pdf
Download
30-MACFF Configuration Commands.pdf
Download
31-L2 Channel Configuration Commands.pdf
Download
32-Loopback Detection Configuration Commands.pdf
Download
33-QoS Configuration Commands.pdf
Download
34-DoS-Attack Prevention Configuration Commands.pdf
Download
35-Anti-Attack Configuration Commands.pdf
Download
36-Network Protocol Configuration Commands.pdf
Download
37-IP ACL Application Configuration Commands.pdf
Download
38-IPv6 Configuration Commands.pdf
Download
39-ND Configuration Commands.pdf
Download
40-NTP Configuration Commands.pdf
Download
S2928 Hardware Installation Manual.pdf
Download
01-Configuration Preparation.pdf
Download
02-Basic Configuration.pdf
Download
03-Network Management Configuration.pdf
Download
04-Security Configuration.pdf
Download
05-WEB Configuration.pdf
Download
06-Interface Configuration.pdf
Download
07-Interface Range Configuration.pdf
Download
08-Port Physical Characteristics Configuration.pdf
Download
09-Port Additional Characteristics Configuration.pdf
Download
10-Port Mirroring Configuration.pdf
Download
14-802.1x Configuration.pdf
Download
15-VLAN Configuration.pdf
Download
16-GVRP Configuration.pdf
Download
17-STP Configuration.pdf
Download
18-STP Optional Characteristic Configuration.pdf
Download
19-Link Aggregation Configuration.pdf
Download
20-PDP Configuration.pdf
Download
21-LLDP Configuration.pdf
Download
22-BackupLink Configuration.pdf
Download
23-EAPS Configuration.pdf
Download
24-MEAPS Configuration.pdf
Download
25-UDLD Configuration.pdf
Download
26-IGMP-snooping Configuration.pdf
Download
27-MLD-Snooping Configuration.pdf
Download
28-OAM Configuration.pdf
Download
29-CFM and Y1731 Configuration.pdf
Download
30-DHCP-snooping Configuration.pdf
Download
31-MACFF Configuration.pdf
Download
32-Layer-2 Tunnel Configuration.pdf
Download
33-Loopback Detection Configuration.pdf
Download
34-QoS Configuration.pdf
Download
35-DoS Attack Prevention Configuration.pdf
Download
36-Attack Prevention Configuration.pdf
Download
37-Network Protocol Configuration.pdf
Download
38-IP ACL Application Configuration.pdf
Download
39-IPv6 Configuration.pdf
Download
40-ND Configuration.pdf
Download
41-NTP Configuration.pdf
Download