Notifications
Notifications
CDW Logo

Cisco Catalyst 2970 24 10/100/1000 BASE-T ports

Mfg # WS-C2970G-24T-E CDW # 511987 | UNSPSC 43222612

Quick tech specs

  • 24-port 10/100/1000BASE-T (RJ-45) Gigabit Ethernet managed stackable rackmountable switch
View All

Know your gear

The Cisco Catalyst 2970 Switch is an affordable Gigabit-to-the-desktop Ethernet switch that delivers wire-speed intelligent services

The Cisco® Catalyst® 2970 Switch is an affordable Gigabit-to-the-desktop Ethernet switch that delivers wire-speed intelligent services. With 24 10/100/1000 BASE-T ports, the Cisco Catalyst 2970 Series Switch is ideal for high-performance department workgroups and small enterprise branch offices that need to boost network performance over existing Category 5 copper cabling. Featuring a complete set of intelligent services, the Cisco Catalyst 2970 Switch can enhance network performance and increase productivity for today's knowledge workers by intelligently scaling beyond 100Mbps.

With the wide range of security features that the Cisco Catalyst 2970 Switch offers, businesses can protect important information, keep unauthorized people off of the network, guard privacy, and maintain uninterrupted operation.

The Identity-Based Networking Services (IBNS) feature in the Cisco Catalyst 2970 Switch prevents unauthorized access and helps to ensure that users get only their designated privileges. It provides the ability to dynamically administer granular levels of network access. Using the 802.1x standard and the Cisco Secure Access Control Server (ACS), users can be assigned a virtual LAN (VLAN) or an ACL upon authentication, regardless of where they connect to the network. This allows IT departments to enable strong security policies without compromising user mobility—and with minimal administrative overhead.

To guard against denial-of-service and other attacks, ACLs can be used to restrict access to sensitive portions of the network, blocking unauthorized access to servers and applications, by denying packets based on source and destination MAC addresses, IP addresses, or Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports. ACL lookups are done in hardware, so forwarding performance is not compromised when implementing ACL-based security.

Port security can be used to limit access on an Ethernet port based on the MAC address of the device that is connected to it. It can also limit the total number of devices plugged into a switch port, reducing the risks of rogue wireless access points or hubs.

Secure Shell (SSH), Kerberos, and Simple Network Management Protocol Version 3 (SNMPv3) encrypt administrative and network management information, protecting the network from tampering or eavesdropping. Terminal Access Controller Access Control System (TACACS+) and Remote Access Dial-In User Service (RADIUS) authentication enable centralized access control of switches and restrict unauthorized users from altering the configurations. Alternatively, a local username and password database can be configured on the switch itself. Fifteen levels of authorization on the switch console and two levels on the Web-based management interface provide the ability to give different levels of configuration capabilities to different administrators.

The MAC Address Notification feature can be used to monitor the network and track users by sending an alert to a management station so that network administrators know when and where users entered the network. The Dynamic Host Configuration Protocol (DHCP) Interface Tracker (Option 82) feature tracks where a user is physically connected on a network by providing both the switch and the port ID to a DHCP server.

The Private VLAN Edge feature isolates ports on a switch, helping to ensure that traffic travels directly from the entry point to the aggregation device through a virtual path and cannot be directed to another port.

This item was discontinued on February 16, 2007

Enhance your purchase