Cisco RV180 Manual do Utilizador Página 4

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 7
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 3
© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Specifications
Description
Network
Network Protocols
Dynamic Host Configuration Protocol (DHCP) server
Point-to-Point Protocol over Ethernet (PPPoE)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
DNS proxy
DHCP relay agent
IGMP proxy and multicast forwarding
Rapid Spanning Tree Protocol (RSTP)
Dynamic Domain Name System (TZO, DynDNS, 3322.org)
Network Address Translation (NAT), Port Address Translation (PAT)
One-to-One NAT
Port management
Port mirroring
Software configurable DMZ to any LAN IP address
Session Initiation Protocol (SIP) Application Layer Gateways (ALG)
LAN
Four (4) 10/100/1000 Mbps Gigabit LAN ports with managed switch
WAN
One (1) 10/100/1000 Mbps Gigabit WAN port
WLAN
Built-in high-speed 802.11n wireless access point
Routing Protocols
Static routing
Dynamic routing
RIP v1 and v2
Inter-VLAN routing
Network Address Translation
(NAT)
Port Address Translation (PAT), Network Address Port Translation (NAPT) protocol
VLAN Support
Port-based and 802.1Q tag-based VLANs
Number of VLANs
4 active VLANs (3-4096 range)
IPv6
Dual-stack IPv4 and IPv6
6to4 tunneling
Multicast Listener Discovery (MLD) for IPv6 (RFC2710)
Stateless address auto-configuration
DHCPv6 Server for IPv6 Clients on LAN
DHCP v6 client for WAN connectivity
Internet Control Message Protocol (ICMP) v6
Static IPv6 Routing
Dynamic IPv6 Routing with RIPng
Network Edge (DMZ)
Software configurable to any LAN IP address
Layer 2
802.1Q-based VLANS, 4 active VLANS
Security
Firewall
Stateful packet inspection (SPI) firewall, port forwarding and triggering, denial-of-service (DoS) prevention,
software-based DMZ
DoS Attacks Prevented:
SYN Flood Detect Rate (max/sec)
Echo Storm (ping pkts/sec)
ICMP Flood (ICMP pkts/sec)
Block UDP Flood
Block TCP Flood
Block Java, Cookies, Active-C, HTTP Proxy
Access Control
IP access control lists; MAC-based wireless access control
Content Filtering
Static URL blocking or keyword blocking
Secure Management
HTTPS, username/password complexity
WPS
Wi-Fi Protected Setup
Vista de página 3
1 2 3 4 5 6 7

Comentários a estes Manuais

Sem comentários