Edimax Technology ES-5226RM User Manual
24‐port fas

24‐Port Fas
QoS with 4 Priority Queues
The QoS (Quality of Service) feature provides 8 intern
traffic. High priority packet streams will experience le
latency level for certain delay‐sensitive traffic. It can c
according to 802.1p priority tag and DSCP. The QoS o
scheduling at each egress port can be based upon a s
Port Mirroring
The port mirroring feature allows the ingress traffic to
track network errors or abnormal packet transmission
ingress traffic to be monitored by a single port that is
capture port can be any port. Mirroring multiple port
mirror capture port.
Q‐in‐Q VLAN for Improved Performance & Security
The VLAN feature in the switch offers the benefit of im
to isolate traffic between different users, thus providi
within the same VLAN broadcast domain also enhanc
tags, is an efficient method to enable subscriber aggr
Isolated Group for Port Protection
The isolated group feature allows certain ports to be
non‐isolated. Traffic between isolated group member
isolated group to the non‐isolated group.
802.1x Port‐Based Network Access Control for Impro
The 802.1x feature enables user authentication for ev
feature allows users to limit network access to non‐re
can establish an access mechanism based on user and
number of access stations.
ES-5226RM
st Ethernet Management Switch
with 2 Gigabit Combo Slots
nal queues to support 2 different classifications of
ess delay inside the switch, which provides a lower
classify the packet as one of the 2 priorities
perates at full wire speed, and the actual
strict weighted round robin.
o execute port copying. This mechanism helps
n without interrupting the flow of data, allowing
defined as a mirror capture port. The mirror
s is possible, but can create congestion at the
mproved security and performance. VLAN is used
ing better security. Limiting the broadcast traffic
ces performance. Q‐in‐Q, the use of double VLAN
regation.
designated as protected ports. All other ports are
rs are blocked. Traffic can only be sent from the
oved Network Security
very network access attempt. The port security
egistered users. By enabling these features, users
d machine identities, as well as control the