Overview

TR-CES-2716-Series

Techroutes TR-CES-2716-Series the industrial carrier Ethernet switches are small but power full switches designed for carrier 3G/4G backhaul networks with the unified operation, the equipment can make better use of themselves. TR-CES2716 series adopt patented ORING+TM self-healing rings. Its hardware-based algorithm ensures the failover time in every node less than 5ms and the network self-healing time less than 50ms (typical value).TR-CES2716 also supports IEC62439-2 based MRP,IEC62439-3 based PRP, and HSR.TR-CES2716 switches adopt the half-rack frame and support 16 Ports out of which 8 10/100/1000M electrical ports and 8 100/1000M SFP slots or 4 10/100/1000M electrical ports and 12 100/1000M SFP slots which makes network establishment more flexible and prompt.TR-CES2716 Switches designed to withstand in harsh environment, the fan less design switch supports operational temperature range of – 40℃ to 70℃

Product Feature

  •  Supporting IEC61850-3 and IEEE1613
  • Supporting transmits multicast packets such as packets about IEC 61850 GOOSE or sampling values.
  • Supporting ORING+TM based Ethernet ring and multiple self-healing rings with the fail-over time in every node less than 5ms and the net- work self-healing time less than 50ms (typical value)
  • Supporting IEEE1588V2(PTP) Boundary Clock (BC),E2E transparent clock, and P2P transparent clock (TC)
  • Supporting IEC62439-2 based MRP
  • Any two ports can establish a self-healing ring and support multiple independent self-healing rings with function of data packet dropout protection and quick recover from network failure.
  • Supporting various multicast protocols and strong safety protection mechanism
  • Providing bandwidth service with different levels in Ethernet service by speed limiting and traffic shaping in QoS of layer 2
  • Supports Auto Provisioning
  • Supporting function of the static and dynamic allocation as well as limitation of CPU and real- time monitor the key operating parameters, including CPU utilization rate,RAM, supply voltage and mainboard voltage.
  • TR-CES-2716 series have a full set of professional network management and monitoring and alarm system. And they also support OPC.
  • Adopting redundant dual power input design

Specification

Hardware Specification

Backplane bandwidth:

52Gbps

CPU:

600MHz RISC

Switching technique:

ASIC based parallel store and forward

MAC address table:

8K

Buffer:

1.5M (Min)

Exchange rate:

148,800 pps/100M ports

1,488,000 pps/1000M ports

Software Features

Ethernet Standards

IEEE 1588v2 with one-step clock support

IEEE 802.3 CSMA/CD method and physical Layer specifications

IEEE 802.1p Priority Queuing

IEEE 802.1q VLAN tagging

IEEE 802.1d Spanning Tree Algorithm

IEEE 802.1w Rapid Spanning Tree

IEEE 802.1s Multiple Spanning Tree

IEEE 802.3ac VLAN Tagging

IEEE 802.1x Authentication

IEEE 802.3ad Link Aggregation

IEEE 802.3x Flow Control

IEEE 802.3 Ethernet

IEEE 802.3u Fast Ethernet

IEEE 802.3z Gigabit Ethernet

IEEE 802 Networks

MAC exchange

Static configuration and dynamic MAC learning

MAC browsing and removal

Configurable aging time of the MAC address

Limited number of learnable MAC addresses

MAC filtration

Black-hole MAC list

VLAN

4K VLAN

GVRP

1:1 VLAN mapping and N:1 VLAN mapping

QinQ and flexible QinQ

PVLAN

Multicast

802.1D (STP), 802.1W (RSTP) and 802.1S (MSTP)

BPDU protection, root protection, and loopback protection

IGMP v1/v2/v3

IGMP snooping

IGMP Fast Leave

Multicast group strategy and quantity limitation

Multicast flow copying over VLANs

IPv6

ICMPv6, DHCPv6, ACLv6 and IPv6 Telnet

IPv6 neighbor discovery

Path MTU discovery

MLD V1/V2

IGMP snooping

QoS

Flow classification based on L2~4 protocols

CAR flow limit

802.1P/DSCP priority re-labeling

SP, WRR, and “SP+WRR”

Congestion avoidance mechanisms like Tail-Drop and WRED

Flow monitoring and flow shaping

Security

L2/L3/L4 ACL flow identification and filtration

DDoS attack prevention, TCP’s SYN Flood attack prevention, UDP Flood

attack

prevention, etc

Broadcast/multicast/unknown unicast storm-control

Port isolation

Port security, and “IP+MAC+port” binding

DHCP snooping and DHCP option 82

IEEE 802.1x authentication

Radius BDTacacs+ authentication

Level-based command line protection

Functional redundancy

MRP,HSR,PRP,ORING+,MSTP, RSTP, port trunking

Others

IPv4/IPv6 multicast, storm control,MC/BC protection, support Jumbo Frame, ZTP

Time synchronization:

IEEE1588v2 (BC and TC), NTP,SNTP

Reliability

Static/LACP link aggregation

EAPS and ERPS

ISSU uninterrupted system upgrade

Management

Console, Telnet, SSH, Web

SNMP v1/v2/v3

TFTP

RMON

Physical Performance

MTBF

more than 800,000 hours

Storage temperature

-40oC ~ 85oC

Operating temperature

-40oC ~ 75oC

Humidity

5% ~ 95%,non-condensation

Product size

220x150x44 mm , 220x250x44 mm ( CES2716UP)

Protection grade

IP40

Weight

3.7kg (Max)

Power

70W (Max)

Mechanical Features

Vibration

IEC 60068-2-6

Impact

IEC 60068-2-27

Free- falling:

IEC 60068-2-32

Circuit board:

Approved by IPC

Electromagnetic Characteristics

Electromagnetic radiation

FCC 47 CFR Part 15 Class A EN55022 Class A

Electromagnetic compatibility

IEC(EN)61000-4-2,Cass 4

IEC(EN)61000-4-3,Class 4

IEC(EN)61000-4-4,Class 4

IEC(EN)61000-4-5,Class 4

IEC(EN)61000-4-6,Class 4

IEC(EN)61000-4-9,Class 4

Industry standards and Testing

Product safety:

CE

EN60950-1

FCC

Dangerous area

UL/cUL1604 Class 1 Div 2

Power Industry

IEC61850-3 IEEE1613C37.90.x

File-Name Download
01-Basic Configuration Commands.pdf
Download
02-Network Management Configuration Commands.pdf
Download
03-Security Configuration Commands.pdf
Download
04-WEB Configuration Commands.pdf
Download
05-Interface Configuration Commands.pdf
Download
06-Interface Range Commands.pdf
Download
07-Port Physical Characteristic Configuration Commands.pdf
Download
08-Port Additional Characteristics Configuration Commands.pdf
Download
09-Port Mirroring Configuration Commands.pdf
Download
11-MAC Address Configuration Commands.pdf
Download
12-MAC Access List Configuration Commands.pdf
Download
13-802.1x Configuration Commands.pdf
Download
14-VLAN Configuration Commands.pdf
Download
15-GVRP Configuration Commands.pdf
Download
16-STP Configuration Commands.pdf
Download
17-STP Optional Characteristic Configuration Commands.pdf
Download
18-Link Aggregation Configuration Commands.pdf
Download
20-LLDP Configuration Commands.pdf
Download
21-Backuplink Configuration Commands.pdf
Download
22-ERPS Configuration Commands.pdf
Download
23-MEAPS Configuration Commands.pdf
Download
24-UDLD Configuration Commands.pdf
Download
25-IGMP-snooping Configuration Commands.pdf
Download
26-MLD-Snooping Configuration Commands.pdf
Download
27-OAM Configuration Commands.pdf
Download
28-CFM and Y1731 Configuration Commands.pdf
Download
29-DHCP-snooping Configuration Commands.pdf
Download
30-MACFF Configuration Commands.pdf
Download
31-L2 Channel Configuration Commands.pdf
Download
32-Loopback Detection Configuration Commands.pdf
Download
33-QoS Configuration Commands.pdf
Download
34-DoS-Attack Prevention Configuration Commands.pdf
Download
35-Anti-Attack Configuration Commands.pdf
Download
36-Network Protocol Configuration Commands.pdf
Download
37-IP ACL Application Configuration Commands.pdf
Download
38-IPv6 Configuration Commands.pdf
Download
39-ND Configuration Commands.pdf
Download
40-NTP Configuration Commands.pdf
Download
S2928 Hardware Installation Manual.pdf
Download
01-Configuration Preparation.pdf
Download
02-Basic Configuration.pdf
Download
03-Network Management Configuration.pdf
Download
04-Security Configuration.pdf
Download
05-WEB Configuration.pdf
Download
06-Interface Configuration.pdf
Download
07-Interface Range Configuration.pdf
Download
08-Port Physical Characteristics Configuration.pdf
Download
09-Port Additional Characteristics Configuration.pdf
Download
10-Port Mirroring Configuration.pdf
Download
14-802.1x Configuration.pdf
Download
15-VLAN Configuration.pdf
Download
16-GVRP Configuration.pdf
Download
17-STP Configuration.pdf
Download
18-STP Optional Characteristic Configuration.pdf
Download
19-Link Aggregation Configuration.pdf
Download
20-PDP Configuration.pdf
Download
21-LLDP Configuration.pdf
Download
22-BackupLink Configuration.pdf
Download
23-EAPS Configuration.pdf
Download
24-MEAPS Configuration.pdf
Download
25-UDLD Configuration.pdf
Download
26-IGMP-snooping Configuration.pdf
Download
27-MLD-Snooping Configuration.pdf
Download
28-OAM Configuration.pdf
Download
29-CFM and Y1731 Configuration.pdf
Download
30-DHCP-snooping Configuration.pdf
Download
31-MACFF Configuration.pdf
Download
32-Layer-2 Tunnel Configuration.pdf
Download
33-Loopback Detection Configuration.pdf
Download
34-QoS Configuration.pdf
Download
35-DoS Attack Prevention Configuration.pdf
Download
36-Attack Prevention Configuration.pdf
Download
37-Network Protocol Configuration.pdf
Download
38-IP ACL Application Configuration.pdf
Download
39-IPv6 Configuration.pdf
Download
40-ND Configuration.pdf
Download
41-NTP Configuration.pdf
Download