Features and benefits
Cisco Business 350 Series Switches provide the advanced feature set that growing businesses require and that high-bandwidth applications and technologies demand. The switches provide the following benefits.
Ease of Management and deployment
Cisco Business 350 Series Switches are designed to be easy to use and manage by commercial customers or the partners that serve them, including the following features:
● Cisco Business Dashboard is designed to manage Cisco Business switches, routers, and wireless access points. Cisco Business Dashboard simplifies traditional challenges in deploying and managing business networks while automating the deployment, monitoring, and lifecycle management of the network. Cisco Business 350 Series switches support embedded probe for Cisco Business Dashboard, eliminating the need to set up a separate hardware or virtual machine on site.
● The Cisco Network Plug and Play solution provides a simple, secure, unified, and integrated offering to ease new device rollouts or for provisioning updates to an existing network. The solution provides a unified approach to provision Cisco routers, switches, and wireless devices with a near-zero-touch deployment experience.
● The intuitive user interfaces reduce the time required to deploy, troubleshoot, and manage the network and allow you to support sophisticated capabilities without increasing IT head count.
● The switches also support Text view, a full Command-Line Interface (CLI) option for partners that prefer it.
● Support for Simple Network Management Protocol (SNMP) allows you to set up and manage your switches and other Cisco devices remotely from a network management station, improving IT workflow and mass configurations.
Strong Security
Cisco Business 350 Series Switches provide the advanced security features you need to protect your business data and keep unauthorized users off the network:
● Support for advanced network security applications such as IEEE 802.1X and port security tightly limits access to specific segments of your network. Web-based authentication provides a consistent interface to authenticate all types of host devices and operating systems, without the complexity of deploying IEEE 802.1X clients on each endpoint.
● Advanced defense mechanisms, including dynamic Address Resolution Protocol (ARP) inspection, IP Source Guard, and Dynamic Host Configuration Protocol (DHCP) snooping, detect and block deliberate network attacks. Combinations of these protocols are also referred to as IP-MAC port binding (IPMB).
● IPv6 First Hop Security extends the advanced threat protection to IPv6. This comprehensive security suite includes ND inspection, RA guard, DHCPv6 guard, and neighbor binding integrity check, providing unparalleled protection against a vast range of address spoofing and man-in-the-middle attacks on IPv6 networks.
Brend Cisco
Model name CBS350-8S-E-2G
Capacity in Millions of Packets per Second (mpps) (64-byte packets). 14.88
Switching Capacity in Gigabits per Second (Gbps) 20.0
Spanning Tree Protocol |
Standard 802.1d Spanning Tree support Fast convergence using 802.1w (Rapid Spanning Tree [RSTP]), enabled by default Multiple Spanning Tree instances using 802.1s (MSTP); 8 instances are supported Per-VLAN Spanning Tree Plus (PVST+) and Rapid PVST+ (RPVST+); 126 instances are supported |
|||||||
Port grouping/link aggregation |
Support for IEEE 802.3ad Link Aggregation Control Protocol (LACP) ● Up to 8 groups ● Up to 8 ports per group with 16 candidate ports for each (dynamic) 802.3ad link aggregation |
|||||||
VLAN |
Support for up to 4,094 VLANs simultaneously Port-based and 802.1Q tag-based VLANs; MAC-based VLAN; protocol-based VLAN; IP subnet-based VLAN Management VLAN Private VLAN with promiscuous, isolated, and community port Private VLAN Edge (PVE), also known as protected ports, with multiple uplinks Guest VLAN, unauthenticated VLAN Dynamic VLAN assignment via RADIUS server along with 802.1x client authentication CPE VLAN |
|||||||
Voice VLAN |
Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers network wide zero-touch deployment of voice endpoints and call control devices |
|||||||
Multicast TV VLAN |
Multicast TV VLAN allows the single multicast VLAN to be shared in the network while subscribers remain in separate VLANs. This feature is also known as Multicast VLAN Registration (MVR) |
|||||||
VLAN Translation |
Support for VLAN One-to-One Mapping. In VLAN One-to-One Mapping, on an edge interface customer VLANs (C-VLANs) are mapped to service provider VLANs (S-VLANs) and the original C-VLAN tags are replaced by the specified S-VLAN |
|||||||
Q-in-Q |
VLANs transparently cross a service provider network while isolating traffic among customers |
|||||||
Selective Q-in-Q |
Selective Q-in-Q is an enhancement to the basic Q-in-Q feature and provides, per edge interface, multiple mappings of different C-VLANs to separate S-VLANs Selective Q-in-Q also allows configuring of Ethertype (Tag Protocol Identifier [TPID]) of the S-VLAN tag Layer 2 protocol tunneling over Q-in-Q is also supported |
|||||||
Generic VLAN Registration Protocol (GVRP)/Generic Attribute Registration Protocol (GARP) |
Generic VLAN Registration Protocol (GVRP) and Generic Attribute Registration Protocol (GARP) enable automatic propagation and configuration of VLANs in a bridged domain |
|||||||
Unidirectional Link Detection (UDLD) |
UDLD monitors physical connection to detect unidirectional links caused by incorrect wiring or cable/port faults to prevent forwarding loops and black holing of traffic in switched networks |
|||||||
Dynamic Host Configuration Protocol (DHCP) Relay at Layer 2 |
Relay of DHCP traffic to DHCP server in different VLAN; works with DHCP Option 82 |
|||||||
Internet Group Management Protocol (IGMP) versions 1, 2, and 3 snooping |
IGMP limits bandwidth-intensive multicast traffic to only the requesters; supports 2K multicast groups (source-specific multicasting is also supported) |
|||||||
IGMP Querier |
IGMP querier is used to support a Layer 2 multicast domain of snooping switches in the absence of a multicast router |
|||||||
IGMP proxy |
The IGMP proxy provides a mechanism for multicast forwarding based on IGMP membership information without the need for more complicated multicast routing protocols. |
|||||||
Head-of-Line (HOL) blocking |
HOL blocking prevention |
|||||||
Loopback Detection |
Loopback detection provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of STP |
|||||||