Huawei PDC-350WA-B 02310PQN for Huawei S6700-24-EI S6720-30C-EI-24S-AC S6700-48-EI
The S6700 series switches (S6700s) are next-generation 10G box switches. The S6700 can function as an access switch in an Internet data center (IDC) or a core switch on a campus network.
The S6700 has industry-leading performance and provides up to 24 or 48 line-speed 10GE ports. It can be used in a data center to provide 10 Gbit/s access to servers or function as a core switch on a campus network to provide 10 Gbit/s traffic aggregation. In addition, the S6700 provides a wide variety of services, comprehensive security policies, and various QoS features to help customers build scalable, manageable, reliable, and secure data centers.
Large-capacity, high-density 10 Gbit/s access
To provide sufficient bandwidth for users, many servers, particularly those in data centers, use 10G network adapters. The S6700 can be used in data centers to provide high forwarding performance and 10GE ports. The S6700 has the highest density of all 10GE ports and the largest switching capacity among its counterpart switches. Each S6700 provides a maximum of 48 line-speed 10GE ports. S6700 ports support 1GE and 10GE access and can identify optical module types, maximizing the return on investment and allowing users to flexibly deploy services. The S6700 has a large buffering capacity and uses an advanced buffer scheduling mechanism to ensure non-block transmission when data center traffic volume is high.
Comprehensive security policies
The S6700 provides multiple security measures to defend against Denial of Service (DoS) attacks, as well as attacks against networks or users. The S6700 supports DHCP snooping, which discards invalid packets that do not match any binding entries, such as ARP spoofing packets and IP spoofing packets. This prevents hackers from using ARP packets to initiate attacks on campus networks. The interface connected to a DHCP server can be configured as a trusted interface to protect the system against bogus DHCP server attacks. The S6700 supports strict ARP learning, which prevents ARP spoofing attacks that exhaust ARP entries. The S6700 supports centralized MAC address authentication and 802.1x authentication.
Higher reliability mechanisms
The S6700 supports redundant power supplies. You can choose a single power supply or use two power supplies to ensure device reliability. With two fans, the S6700 has a longer MTBF time than its counterpart switches. The S6700 supports the enhanced trunk (E-Trunk) feature. When a CE is dual-homed to two S6700s (PEs), E-Trunk protects the links between the CE and PEs and implements backup between the PEs. E-trunk enhances link reliability between devices. The S6700 supports the Smart Ethernet Protection (SEP) protocol, a ring network protocol applied to the link layer on an Ethernet network.
The S6700 supports Ethernet Ring Protection Switching (ERPS), also referred to as G.8032. As the latest ring network protocol, ERPS was developed based on traditional Ethernet MAC and bridging functions and uses mature Ethernet OAM function and a ring automatic protection switching (R-APS) mechanism to implement millisecond-level protection switching. ERPS supports various services and allows flexible networking, helping customers build a network with lower OPEX and CAPEX. The S6700 supports VRRP. Two S6700s can form a VRRP group to ensure nonstop reliable communication. Multiple equal-cost routes to upstream devices can be configured on the S6700 to provide route redundancy. When an active route is unreachable, traffic is switched to a backup route.
24* GE SFP/10 GE SFP+ ports
48* GE SFP/10 GE SFP+ ports
MAC address table
128K MAC address entries MAC address learning and aging Static, dynamic, and blackhole MAC address entries Packet filtering based on source MAC addresses
4K VLANs Guest VLAN and voice VLAN VLAN assignment based on MAC addresses, protocols, IP subnets, policies, and ports 1:1 and N:1 VLAN Mapping QinQ and selective QinQ
Static routing, RIPv1, RIPv2, ECMP, and URPF OSPF, IS-IS, and BGP VRRP Policy-based routing Routing policy
Static route RIPng OSPFv3 BGP4+
Neighbor Discovery (ND) PMTU IPv6 ping, IPv6 tracert, and IPv6 Telnet 6to4 tunnel, ISATAP tunnel, and manually configured tunnel ACLs based on the source IPv6 address, destination IPv6 address, Layer 4 ports, or protocol type MLD v1/v2 snooping
Static Layer 2 multicast MAC address MAC-based multicast forwarding IGMP snooping and IGMP fast leave Multicast VLAN MLD snooping IGMP proxy Controllable multicast Port-based multicast traffic statistics IGMP v1/v2/v3 PIM-SM, PIM-DM, and PIM-SSM MSDP
Rate limiting on packets sent and received by an interface Packet redirection Port-based traffic policing and two-rate three-color CAR Eight queues on each port WRR, DRR, SP, WRR+SP, and DRR+SP queue scheduling algorithms Re-marking of the 802.1p priority and DSCP priority Packet filtering at Layer 2 to Layer 4, filtering out invalid frames based on the source MAC address, destination MAC address,
source IP address, destination IP address, port number, protocol type, and VLAN ID Rate limiting in each queue and traffic shaping on ports
STP(IEEE 802.1d), RSTP(IEEE 802.1w), and MSTP(IEEE 802.1s) BPDU protection, root protection, and loop protection RRPP ring topology and RRPP multi-instance Smart Link tree topology and Smart Link multi-instance, providing the millisecond-level protection switchover SEP ERPS(G.8032) BFD for OSPF, BFD for IS-IS, BFD for VRRP, and BFD for PIM E-Trunk
DoS attack defense, ARP attack defense, and ICMP attack defense 802.1x authentication and limit on the number of users on an interface AAA authentication, RADIUS authentication and TACACS authentication SSH v2.0 Hypertext Transfer Protocol Secure (HTTPS) CPU defense Blacklist and whitelist
Management and maintenance
iStack (using service ports as stack ports) MAC Forced Forwarding (MFF) Virtual cable test Ethernet OAM (IEEE 802.3ah and 802.1ag) SNMP v1/v2/v3 RMON Web NMS System logs and alarms of different levels GVRP MUX VLAN sFlow