Overview

TR-CES2708-Series

Techroutes CES2708 series—the industrial carrier Ethernet switches are small but power full switches designed for carrier 3G/4G backhaul networks. With the unified operation, the equipment can make better use of themselves. CES2708 series adopt patented ORING+TM self-healing rings. It’s hardware-based algorithm ensures the failover time in every node less than 5ms and the network self-healing time less than 50ms (typical value). CES2708 also supports IEC62439-2 based MRP, IEC62439-3 based PRP, and HSR. CES2708 switches adopt the half-rack frame and support 8×100/1000M SFP slots, or 4 x 10/100/1000M electrical ports and 4 x 100/1000M SFP slots which makes network establishment more flexible and prompt. CES 2708 Switches designed to withstand in harsh environment, the fan less design switch supports op

Poduct Feature

  Performance Features

  • Supporting IEC61850-3 and IEEE1613
  • Supporting transmits multicast packets such as packets about IEC 61850 GOOSE or sampling values.
  • Supporting IEEE1588V2(PTP) Boundary Clock (BC), E2E transparent clock, and P2P transparent clock (TC)
  • Supporting ORING+TM  based Ethernet ring and multiple self-healing rings with the fail-over time in every node less than 5ms and the net- work self-healing time less than 50ms (typical value)
  • Supporting IEC62439-2 based MRP
  • Any two ports can establish a self-healing ring and support multiple independent self-healing rings
  • With function of data packet dropout protection and quick recover from network failure.
  • Supporting various multicast protocols and strong safety protection mechanism
  • Providing bandwidth service with different levels in Ethernet service by speed limiting and traffic shaping in QoS of layer 2
  • Supports Auto Provisioning
  • Supporting function of the static and dynamic allocation as well as limitation of CPU and real- time monitor the key operating parameters, including CPU utilization rate, RAM, supply voltage and mainboard voltage.
  • CES2708 series have a full set of professional network management and monitoring and alarm system. And they also support OPC.
  • Adopting redundant dual power input design

Specification

Ethernet Standards

IEEE 1588v2 with one-step clock support

IEEE 802.3 CSMA/CD method and physical Layer specifications IEEE 802.1p Priority Queuing

IEEE 802.1q VLAN tagging

IEEE 802.1d Spanning Tree Algorithm IEEE 802.1w Rapid Spanning Tree IEEE 802.1s Multiple Spanning Tree IEEE 802.3ac VLAN Tagging

IEEE 802.1x Authentication IEEE 802.3ad Link Aggregation IEEE 802.3x Flow Control IEEE 802.3 Ethernet

IEEE 802.3u Fast Ethernet IEEE 802.3z Gigabit Ethernet

IEEE 802 Networks

MAC exchange

Static configuration and dynamic MAC learning MAC browsing and removal

Configurable aging time of the MAC address Limited number of learnable MAC addresses MAC filtration

Black-hole MAC list

VLAN

4K VLAN GVRP

1:1 VLAN mapping and N:1 VLAN mapping QinQ and flexible QinQ

PVLAN

STP

802.1D (STP), 802.1W (RSTP) and 802.1S (MSTP)

BPDU protection, root protection, and loopback protection

Multicast

IGMP v1/v2/v3 IGMP snooping IGMP Fast Leave

Multicast group strategy and quantity limitation Multicast flow copying over VLANs

IPv6

ICMPv6, DHCPv6, ACLv6 and IPv6 Telnet IPv6 neighbor discovery

Path MTU discovery MLD V1/V2

IGMP snooping

QoS

Flow classification based on L2~4 protocols CAR flow limit

802.1P/DSCP priority re-labeling SP, WRR, and “SP+WRR”

Congestion avoidance mechanisms like Tail-Drop and WRED Flow monitoring and flow shaping

Security

L2/L3/L4 ACL flow identification and filtration

DDoS attack prevention, TCP’s SYN Flood attack prevention, UDP Flood attack prevention, etc

Broadcast/multicast/unknown unicast storm-control Port isolation

Port security, and “IP+MAC+port” binding DHCP snooping and DHCP option 82 IEEE 802.1x authentication

Radius BDTacacs+ authentication Level-based command line protection

Reliability

Static/LACP link aggregation EAPS and ERPS

ISSU uninterrupted system upgrade

Management

Console, Telnet, SSH, Web SNMP v1/v2/v3

TFTP

RMON

File-Name Download
01-Basic Configuration Commands.pdf
Download
02-Network Management Configuration Commands.pdf
Download
03-Security Configuration Commands.pdf
Download
04-WEB Configuration Commands.pdf
Download
05-Interface Configuration Commands.pdf
Download
06-Interface Range Commands.pdf
Download
07-Port Physical Characteristic Configuration Commands.pdf
Download
08-Port Additional Characteristics Configuration Commands.pdf
Download
09-Port Mirroring Configuration Commands.pdf
Download
11-MAC Address Configuration Commands.pdf
Download
12-MAC Access List Configuration Commands.pdf
Download
13-802.1x Configuration Commands.pdf
Download
14-VLAN Configuration Commands.pdf
Download
15-GVRP Configuration Commands.pdf
Download
16-STP Configuration Commands.pdf
Download
17-STP Optional Characteristic Configuration Commands.pdf
Download
18-Link Aggregation Configuration Commands.pdf
Download
20-LLDP Configuration Commands.pdf
Download
21-Backuplink Configuration Commands.pdf
Download
22-ERPS Configuration Commands.pdf
Download
23-MEAPS Configuration Commands.pdf
Download
24-UDLD Configuration Commands.pdf
Download
25-IGMP-snooping Configuration Commands.pdf
Download
26-MLD-Snooping Configuration Commands.pdf
Download
27-OAM Configuration Commands.pdf
Download
28-CFM and Y1731 Configuration Commands.pdf
Download
29-DHCP-snooping Configuration Commands.pdf
Download
30-MACFF Configuration Commands.pdf
Download
31-L2 Channel Configuration Commands.pdf
Download
32-Loopback Detection Configuration Commands.pdf
Download
33-QoS Configuration Commands.pdf
Download
34-DoS-Attack Prevention Configuration Commands.pdf
Download
35-Anti-Attack Configuration Commands.pdf
Download
36-Network Protocol Configuration Commands.pdf
Download
37-IP ACL Application Configuration Commands.pdf
Download
38-IPv6 Configuration Commands.pdf
Download
39-ND Configuration Commands.pdf
Download
40-NTP Configuration Commands.pdf
Download
S2928 Hardware Installation Manual.pdf
Download
01-Configuration Preparation.pdf
Download
02-Basic Configuration.pdf
Download
03-Network Management Configuration.pdf
Download
04-Security Configuration.pdf
Download
05-WEB Configuration.pdf
Download
06-Interface Configuration.pdf
Download
07-Interface Range Configuration.pdf
Download
08-Port Physical Characteristics Configuration.pdf
Download
09-Port Additional Characteristics Configuration.pdf
Download
10-Port Mirroring Configuration.pdf
Download
14-802.1x Configuration.pdf
Download
15-VLAN Configuration.pdf
Download
16-GVRP Configuration.pdf
Download
17-STP Configuration.pdf
Download
18-STP Optional Characteristic Configuration.pdf
Download
19-Link Aggregation Configuration.pdf
Download
20-PDP Configuration.pdf
Download
21-LLDP Configuration.pdf
Download
22-BackupLink Configuration.pdf
Download
23-EAPS Configuration.pdf
Download
24-MEAPS Configuration.pdf
Download
25-UDLD Configuration.pdf
Download
26-IGMP-snooping Configuration.pdf
Download
27-MLD-Snooping Configuration.pdf
Download
28-OAM Configuration.pdf
Download
29-CFM and Y1731 Configuration.pdf
Download
30-DHCP-snooping Configuration.pdf
Download
31-MACFF Configuration.pdf
Download
32-Layer-2 Tunnel Configuration.pdf
Download
33-Loopback Detection Configuration.pdf
Download
34-QoS Configuration.pdf
Download
35-DoS Attack Prevention Configuration.pdf
Download
36-Attack Prevention Configuration.pdf
Download
37-Network Protocol Configuration.pdf
Download
38-IP ACL Application Configuration.pdf
Download
39-IPv6 Configuration.pdf
Download
40-ND Configuration.pdf
Download
41-NTP Configuration.pdf
Download