Overview

TR-S2500 Series

TR-S2500 Series is a new-generation smart access switch designed for carrier’s IP MAN and enterprise networks. Based on the new-generation high-performance hardware and TRROS platform, it supports functions such as ACL, QinQ and QoS.
TR-S2500 Series switches have 3 models: TR-S2510, TR-S2524,TR-S2528GX

Specification

Item TR-S2510 TR-S2524 TR-S2528GX
Switching

capacity

20Gbps 48Gbps 56Gbps
Forwarding rate 14Mpps 35Mpps 41Mpps
Dimensions mm (W×D×H) 240×150×42 442×208×44 440×180×44
Power

consumption

<15W <45W <45W
Power supply AC:100V-240V,50Hz±10%
Environment Operating temperature/humidity:0℃-50℃,10%-90%non-condensing
Storage temperature/humidity:-20℃-70℃;5%-95%non-condensing

MAC switching function

Static configuration and dynamically learning of MAC address
Check and delete MAC address
Configuring of MAC addressaging time
Limiton MAC addresslearning number
MAC address filtering function

VLAN

4KVLAN entries
GVRP
1:1andN:1VLANMapping
QinQ
Private VLAN
STP 802.1D(STP),802.1W(RSTP),802.1S(MSTP)
BPDU protection, root protection and ring protection

Multicast

IGMPv1/v2/v3
IGMP Snooping
IGMP Fast Leave
Multi cast group policy and multicast number limit
Multi cast traffic cross VLAN duplication
IPv4 Default Route

IPv6

ICMPv6,DHCPv6 and IPv6 Telnet
IPv6 Neighbor Discovery
MLDv1/v2
MLD Snooping

QoS

Traffic classification of each field o fL2/L3/L4 protocol headers
CAR traffic control
802.1P/DSCP priority remark
Multi plequeuing algorithms such as SP,WRR or SP+ WRR
Tail-Drop,WRED
Traffic supervision and traffic shaping
Security features IdentificationandfilteringofL2/L3/L4based ACL
Defendag ainst DDoS attack ,SYN Flood attack of TCP or UDP Flood attack
Suppression of broad cast, multi cast and unknown unicast packet
Port isolation
Port security,IP+MAC+port binding
DHCP Snooping,DHCP Option82
IEEE802.1xauthentication
Radius and TR Tacacs+authentication
Command line authority control based on user levels
Reliability Static/LACP link aggregation
ISSU

Management and Maintenance

Console,Telnet,SSH2.0
HTTP
SNMPv1/v2/v3
Upload and down load of TFTP files
RMON

File-Name Download
01-Basic Configuration Commands.pdf
Download
02-Network Management Configuration Commands.pdf
Download
03-Security Configuration Commands.pdf
Download
04-WEB Configuration Commands.pdf
Download
05-Interface Configuration Commands.pdf
Download
06-Interface Range Commands.pdf
Download
07-Port Physical Characteristic Configuration Commands.pdf
Download
08-Port Additional Characteristics Configuration Commands.pdf
Download
09-Port Mirroring Configuration Commands.pdf
Download
11-MAC Address Configuration Commands.pdf
Download
12-MAC Access List Configuration Commands.pdf
Download
13-802.1x Configuration Commands.pdf
Download
14-VLAN Configuration Commands.pdf
Download
15-GVRP Configuration Commands.pdf
Download
16-STP Configuration Commands.pdf
Download
17-STP Optional Characteristic Configuration Commands.pdf
Download
18-Link Aggregation Configuration Commands.pdf
Download
20-LLDP Configuration Commands.pdf
Download
21-Backuplink Configuration Commands.pdf
Download
22-ERPS Configuration Commands.pdf
Download
23-MEAPS Configuration Commands.pdf
Download
24-UDLD Configuration Commands.pdf
Download
25-IGMP-snooping Configuration Commands.pdf
Download
26-MLD-Snooping Configuration Commands.pdf
Download
27-OAM Configuration Commands.pdf
Download
28-CFM and Y1731 Configuration Commands.pdf
Download
29-DHCP-snooping Configuration Commands.pdf
Download
30-MACFF Configuration Commands.pdf
Download
31-L2 Channel Configuration Commands.pdf
Download
32-Loopback Detection Configuration Commands.pdf
Download
33-QoS Configuration Commands.pdf
Download
34-DoS-Attack Prevention Configuration Commands.pdf
Download
35-Anti-Attack Configuration Commands.pdf
Download
36-Network Protocol Configuration Commands.pdf
Download
37-IP ACL Application Configuration Commands.pdf
Download
38-IPv6 Configuration Commands.pdf
Download
39-ND Configuration Commands.pdf
Download
40-NTP Configuration Commands.pdf
Download
S2928 Hardware Installation Manual.pdf
Download
01-Configuration Preparation.pdf
Download
02-Basic Configuration.pdf
Download
03-Network Management Configuration.pdf
Download
04-Security Configuration.pdf
Download
05-WEB Configuration.pdf
Download
06-Interface Configuration.pdf
Download
07-Interface Range Configuration.pdf
Download
08-Port Physical Characteristics Configuration.pdf
Download
09-Port Additional Characteristics Configuration.pdf
Download
10-Port Mirroring Configuration.pdf
Download
14-802.1x Configuration.pdf
Download
15-VLAN Configuration.pdf
Download
16-GVRP Configuration.pdf
Download
17-STP Configuration.pdf
Download
18-STP Optional Characteristic Configuration.pdf
Download
19-Link Aggregation Configuration.pdf
Download
20-PDP Configuration.pdf
Download
21-LLDP Configuration.pdf
Download
22-BackupLink Configuration.pdf
Download
23-EAPS Configuration.pdf
Download
24-MEAPS Configuration.pdf
Download
25-UDLD Configuration.pdf
Download
26-IGMP-snooping Configuration.pdf
Download
27-MLD-Snooping Configuration.pdf
Download
28-OAM Configuration.pdf
Download
29-CFM and Y1731 Configuration.pdf
Download
30-DHCP-snooping Configuration.pdf
Download
31-MACFF Configuration.pdf
Download
32-Layer-2 Tunnel Configuration.pdf
Download
33-Loopback Detection Configuration.pdf
Download
34-QoS Configuration.pdf
Download
35-DoS Attack Prevention Configuration.pdf
Download
36-Attack Prevention Configuration.pdf
Download
37-Network Protocol Configuration.pdf
Download
38-IP ACL Application Configuration.pdf
Download
39-IPv6 Configuration.pdf
Download
40-ND Configuration.pdf
Download
41-NTP Configuration.pdf
Download
S2928 Hardware Installation Manual.pdf
Download