2013年12月31日星期二

What is the Default BootROM Password of Huawei Switch

Question 1: What is the Default BootROM Password of Huawei Switch?

Answer 1: When the system starts the BootROM, press Ctrl+B within two seconds and then enter the default password to enter the BootROM menu. In versions earlier than V200R001, the default password is huawei. In V200R001 and later versions, the default password is
Admin@huawei.com.

Question 2: Do I Need to Upgrade the BootROM When I Run S2700-26TP-PWR-EI the
startup system-software Command on a Case-shaped
Switch to Specify the Software Package for Next Startup?

Answer 2: In V100R006 and earlier versions, the system displays the following information when you run the startup system-software command to specify the software package for next startup: "Warning: Basic BOOTROM will be upgraded. Continue?(Y/N)[N]." You must upgrade the BootROM; otherwise, the switch cannot start. Follow the instruction in the upgrade guide when you upgrade a switch.
In versions later than V100R006, the system automatically upgrades the BootROM after you run the startup system-software command to specify the software package for next startup.

Question 3: Does the Switch S2700 S2700-26TP-SI-AC Support the Remote Upgrade of the
BootROM?

Answer 3: The switch supports the remote upgrade of the BootROM.

Log in to the switch where the BootROM needs to be upgraded through Telnet, and then run the upgrade basic-bootrom system-filename command in the system view to upgrade the BootROM.

2013年12月23日星期一

How to Configuring Local Traffic Mirroring of Huawei Router

Pre-configuration Tasks
Before configuring local traffic mirroring, complete the following task:
Ensuring that the link layer protocol status of ports is Up.

1 Configuring a Local Observing Port
Context
In local mirroring, the monitoring device is directly connected to the observing port.
Do not configure other functions on an observing port; otherwise, the mirroring function is
affected.
1 If other service packets are transmitted on the observing port besides the mirrored packets, the packet sources cannot be identified.
2 If congestion occurs on the observing port, mirrored packets may be discarded because of their low priorities.

Step 1 Run:
system-view
The system view is displayed.

Step 2 Run:
observe-port interface interface-type interface-number
A local observing port is configured.
----End

2 Configuring a Traffic Classifier
Configure complex traffic classification by selecting proper traffic classification rules. For
details, see Configuring a Traffic Classifier in the Huawei AR150&200&1200&2200&3200
Series Enterprise Routers Configuration Guide - QoS.

3 Configuring a Traffic Behavior
By configuring the traffic behavior, the device mirrors all the packets matching traffic
classification rules to the observing interface.

Procedure
Step 1 Run:
system-view
The system view is displayed.

Step 2 Run:
traffic behavior behavior-name
A traffic behavior is configured and its view is displayed.

Step 3 Run:
mirror to observe-port
Traffic matching the rules is mirrored to the specified observing port.
----End

4 Configuring a Traffic Policy
Step 1 Run:
system-view
The system view is displayed.

Step 2 Run:
traffic policy policy-name
A traffic policy is created and its view is displayed.

Step 3 Run:
classifier classifier-name behavior behavior-name
The traffic policy is associated with the traffic classifier and the traffic behavior containing traffic mirroring.
In the preceding command, classifier-name specifies a traffic classifier. The value of this
parameter must be the same as the value set in 7.5.2 Configuring a Traffic Classifier. The
behavior-name parameter specifies a traffic behavior. The value of this parameter must be the same as the value set Configuring a Traffic Behavior.
----End

5 Applying a Traffic Policy
You can apply a traffic policy bound to traffic behaviors and traffic classifiers to a mirrored port. For details, see Applying the Traffic Policy in the Huawei AR150&200&1200&2200&3200 Series Enterprise Routers Configuration Guide - QoS.

6 Checking the Configuration
1 Run the display observe-port command to check the observing port.
2 Run the display traffic behavior { system-defined | user-defined } [ behavior-name ]
command to check the traffic behavior configuration.
3 Run the display traffic classifier { system-defined | user-defined } [ classifier-name ]
command to check the traffic classifier configuration.
4 Run the display traffic policy user-defined [ policy-name [ classifier classifier-name ] ]
command to check the traffic policy configuration.
5 Run the display traffic-policy applied-record [ policy-name ] command to check the
application record of a specified mirroring policy.

----End
Customers interested in purchasing huawei router or the price, please refer to below links:

Contact information:
Telephone: +852-30501940(Hong Kong)
Fax: +852-30501941
Email:   sales@huanetwork.com(Sales Inquiries)
Address: 3/F, China Fen Hin Bld., 5 Cheung Yue St., Cheung Sha Wan, KLN., Hong Kong
Website: http://www.huanetwork.com

How to Configure Remote Port Mirroring of Huawei Router

Before configuring remote port mirroring on Huawei router, complete the following tasks:
Configuring routing protocols to ensure reachable routes between the mirrored device and
the monitoring device
Configuring a GRE over IPv4 Tunnel

Configuration overview
Configuring the Observing Server (taking the AR3200 and AR1200 as the example)

Step 1 Run:
system-view
The system view is displayed.

Step 2 Run:
observe-server destination-ip destination-ip-address source-ip source-ip-address
[ dscp dscp-value ]
An observing server is configured for remote mirroring.
NOTE
1 In the preceding command, destination-ip-address specifies the IP address of the monitored device, and source-ip-address specifies the IP address of a mirrored port.
2 If the monitoring device and mirrored port use private IP addresses, perform the task in Configuring a GRE over IPv4 Tunnel before configuring the monitoring device.
----End

Configuring a Remote Mirrored Port
Context
A mirrored port can be an Ethernet port or an Eth-Trunk port. If you want to configure an Eth-Trunk as a mirrored port, run the interface eth-trunk trunk-id command to create an Eth-Trunk first.
1 If an Eth-Trunk is configured as a mirrored port, its member ports cannot be configured as mirrored ports. To configure a member port as a mirrored port, delete it from the Eth-Trunk first.
2 If a member port of an Eth-Trunk is configured as a mirrored port, the Eth-Trunk cannot
be configured as a mirrored port. To configure the Eth-Trunk as a mirrored port, delete the
member port from it first.

Step 1 Run:
system-view
The system view is displayed.

Step 2 Run:
interface interface-type interface-number
The interface view is displayed.

Step 3 Run:
mirror to observe-server{ both | inbound | outbound }
A remote mirrored port is configured.
----End

Checking the Configuration
1 Run the display observe-server command to check the observing server.
2 Run the display mirror-port command to check the port mirroring configuration.

----End

2013年12月19日星期四

How to Configure Basic SNMPv3 Functions on Huawei S5700


Note:
The security levels from the highest to the lowest must be trap host security, user security, and user group security.

The security level description is as follows:
Level 1: privacy (authentication and encryption)
Level 2: authentication (only authentication)
Level 3: none (no authentication and no encryption)

If the security level of a user group is level 1, the security levels of user and trap host must be level 1. If the security level of a user group is level 2, the security levels of user and trap host can be level 1 or level 2.

Configure Basic SNMPv3 Functions on Huawei S5700.
Procedure
Step 1 Run:
system-view
The system view is displayed.

Step 2 (Optional) Run:
snmp-agent
The SNMP agent function is enabled.
By default, the SNMP agent function is disabled. By executing the snmp-agent command with any parameter enables the SNMP agent function.

Step 3 (Optional) Run:
snmp-agent udp-port port-num
The listening port number of the SNMP agent is changed.
The default listening port number of the SNMP agent is 161.
To enhance device security, run the snmp-agent udp-port command to change the listening port number of the SNMP agent.

Step 4 (Optional) Run:
snmp-agent sys-info version v3
The SNMP version is configured.
SNMPv3 is enabled by default; therefore, this step is optional.

Step 5 (Optional) Run:
snmp-agent local-engineid engineid
An engine ID is set for the local SNMP entity.
By default, the device automatically generates an engine ID using the internal algorithm. The engine ID is composed of enterprise ID+device information.
If the local engine ID is set or changed, the existing SNMPv3 user will be deleted.

Step 6 Run:
snmp-agent group v3 group-name [ authentication | privacy ]
An SNMPv3 user group is configured.
If the network or network devices are in an insecure environment (for example, the network is vulnerable to attacks), authentication or privacy can be configured in the command to enable data authentication or privacy. By default, the created SNMP group is neither authenticated nor encrypted.

Step 7 Run:
snmp-agent usm-user v3 user-name [ group group-name | acl acl-name ] *
A user is added to the SNMPv3 user group.

Step 8 Run:
snmp-agent usm-user v3 user-name authentication-mode { md5 | sha } [ cipher password ]
The authentication password of the SNMPv3 user is added.

Step 9 Run:
snmp-agent usm-user v3 user-name privacy-mode { des56 | aes128 | aes192 | aes256 | 3des } [ cipher password ]
The password of the SNMPv3 user is added.
AES128 and AES256 algorithm are recommended to improve data transmission security.
After a user is added to the user group, the NMS that uses the name of the user can access the objects in the ViewDefault view (OID: 1.3.6.1). If the local engine ID is set or changed, the existing SNMPv3 user will be deleted.
If authentication and privacy have been enabled for the user group, the following authentication and privacy modes can be configured for the data transmitted on the network.

Step 10 Configure the destination IP address for receiving traps and error codes.On an IPv4 network, run:
snmp-agent target-host trap address udp-domain ip-address [ udp-port port-number | source interface-type interface-number | [ public-net | vpn-instance
Issue 01 (2013-11-05) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
30 vpn-instance-name ] ] * params securityname security-name [ v3 [ authentication | privacy ] | private-netmanager | notify-filter-profile profile-name | ext-vb ] * On an IPv6 network, run:
snmp-agent target-host trap ipv6 address udp-domain ipv6-address [ udp-port port-number ] params securityname security-name [ v3 [ authentication | privacy ] | private-netmanager | notify-filter-profile profile-name | ext-vb ] *
Note the following when running the command:
The default destination UDP port number is 162. To ensure secure communication between the NMS and managed devices, run the udp-port command to change the UDP port number to a non-well-known port number. The parameter security-name identifies devices that send traps on the NMS. If the NMS and managed device are both Huawei products, the parameter private-netmanager can be configured to add more information to trap messages, such as the alarm type, alarm serial number, and alarm sending time. The information will help you locate and solve problems more quickly.
The value of security-name must be the same as the created user name. Otherwise, the NMS cannot access the managed device.

Step 11 (Optional) Run:
snmp-agent sys-info { contact contact | location location }
The equipment administrators contact information or location is configured.
By default, the vendor's contact information is "R&D Beijing, Huawei Technologies co.,Ltd.". The default location is "Beijing China".
This step is required for the NMS administrator to view contact information and locations of the equipment administrator when the NMS manages many devices. This helps the NMS administrator to contact the equipment administrators for fault location and rectification.

Step 12 (Optional) Run:
snmp-agent packet max-size byte-count
The maximum size of SNMP messages that the device can receive and send is set.
By default, the maximum size of SNMP messages is 12000 bytes.
When the size of an SNMP message is larger than the configured value, the device discards the SNMP message. To ensure that NMS can process SNMP packets properly, set the parameter byte-count based on the maximum size of an SNMP packet that the NMS can process.
----End



How to Configure Basic SNMPv3 Functions on Huawei S5700


Note:
The security levels from the highest to the lowest must be trap host security, user security, and user group security.

The security level description is as follows:
Level 1: privacy (authentication and encryption)
Level 2: authentication (only authentication)
Level 3: none (no authentication and no encryption)

If the security level of a user group is level 1, the security levels of user and trap host must be level 1. If the security level of a user group is level 2, the security levels of user and trap host can be level 1 or level 2.

Configure Basic SNMPv3 Functions on Huawei S5700.
Procedure
Step 1 Run:
system-view
The system view is displayed.

Step 2 (Optional) Run:
snmp-agent
The SNMP agent function is enabled.
By default, the SNMP agent function is disabled. By executing the snmp-agent command with any parameter enables the SNMP agent function.

Step 3 (Optional) Run:
snmp-agent udp-port port-num
The listening port number of the SNMP agent is changed.
The default listening port number of the SNMP agent is 161.
To enhance device security, run the snmp-agent udp-port command to change the listening port number of the SNMP agent.

Step 4 (Optional) Run:
snmp-agent sys-info version v3
The SNMP version is configured.
SNMPv3 is enabled by default; therefore, this step is optional.

Step 5 (Optional) Run:
snmp-agent local-engineid engineid
An engine ID is set for the local SNMP entity.
By default, the device automatically generates an engine ID using the internal algorithm. The engine ID is composed of enterprise ID+device information.
If the local engine ID is set or changed, the existing SNMPv3 user will be deleted.

Step 6 Run:
snmp-agent group v3 group-name [ authentication | privacy ]
An SNMPv3 user group is configured.
If the network or network devices are in an insecure environment (for example, the network is vulnerable to attacks), authentication or privacy can be configured in the command to enable data authentication or privacy. By default, the created SNMP group is neither authenticated nor encrypted.

Step 7 Run:
snmp-agent usm-user v3 user-name [ group group-name | acl acl-name ] *
A user is added to the SNMPv3 user group.

Step 8 Run:
snmp-agent usm-user v3 user-name authentication-mode { md5 | sha } [ cipher password ]
The authentication password of the SNMPv3 user is added.

Step 9 Run:
snmp-agent usm-user v3 user-name privacy-mode { des56 | aes128 | aes192 | aes256 | 3des } [ cipher password ]
The password of the SNMPv3 user is added.
AES128 and AES256 algorithm are recommended to improve data transmission security.
After a user is added to the user group, the NMS that uses the name of the user can access the objects in the ViewDefault view (OID: 1.3.6.1). If the local engine ID is set or changed, the existing SNMPv3 user will be deleted.
If authentication and privacy have been enabled for the user group, the following authentication and privacy modes can be configured for the data transmitted on the network.

Step 10 Configure the destination IP address for receiving traps and error codes.On an IPv4 network, run:
snmp-agent target-host trap address udp-domain ip-address [ udp-port port-number | source interface-type interface-number | [ public-net | vpn-instance
Issue 01 (2013-11-05) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
30 vpn-instance-name ] ] * params securityname security-name [ v3 [ authentication | privacy ] | private-netmanager | notify-filter-profile profile-name | ext-vb ] * On an IPv6 network, run:
snmp-agent target-host trap ipv6 address udp-domain ipv6-address [ udp-port port-number ] params securityname security-name [ v3 [ authentication | privacy ] | private-netmanager | notify-filter-profile profile-name | ext-vb ] *
Note the following when running the command:
The default destination UDP port number is 162. To ensure secure communication between the NMS and managed devices, run the udp-port command to change the UDP port number to a non-well-known port number. The parameter security-name identifies devices that send traps on the NMS. If the NMS and managed device are both Huawei products, the parameter private-netmanager can be configured to add more information to trap messages, such as the alarm type, alarm serial number, and alarm sending time. The information will help you locate and solve problems more quickly.
The value of security-name must be the same as the created user name. Otherwise, the NMS cannot access the managed device.

Step 11 (Optional) Run:
snmp-agent sys-info { contact contact | location location }
The equipment administrators contact information or location is configured.
By default, the vendor's contact information is "R&D Beijing, Huawei Technologies co.,Ltd.". The default location is "Beijing China".
This step is required for the NMS administrator to view contact information and locations of the equipment administrator when the NMS manages many devices. This helps the NMS administrator to contact the equipment administrators for fault location and rectification.

Step 12 (Optional) Run:
snmp-agent packet max-size byte-count
The maximum size of SNMP messages that the device can receive and send is set.
By default, the maximum size of SNMP messages is 12000 bytes.
When the size of an SNMP message is larger than the configured value, the device discards the SNMP message. To ensure that NMS can process SNMP packets properly, set the parameter byte-count based on the maximum size of an SNMP packet that the NMS can process.
----End



Can the OSN 1500 Support 3G/LTE Mobile Backhaul

Yes, the OSN 1500 Support 3G/LTE Mobile Backhaul.
To address 3G/LTE mobile backhauling requirements, Huawei's equipment provides complete transmission solutions in the packet domain, converging and grooming services at the core layer of a wireless network.
And the OSN 1500 has this feature: Universal Switch Architecture, Multi-Service Transmission
With a universal switch architecture, Huawei SDH the OptiX OSN equipment meets requirements for bearing conventional services and the growing number of packet services.

2013年12月2日星期一

Does the DHCP Server Support Super VLAN?

Question 1 : Does the DHCP Server Support Super VLAN?
Answer1 : The DHCP server supports super VLAN on the S3700/S5700/S6700 (from V100R006C00).

Question 2 : Does the DHCP Relay Support Gateway Failover?
cThe DHCP relay on the S3700/S5700/S6700 (from V100R006C00) supports gateway failover.Not the Huawei S2700.
When the master gateway fails to obtain IP addresses, the slave gateways take over and obtain IP addresses.

Question 3 : Does the DHCPv6 Relay Support PD-Relay?
Question 3 : The DHCPv6 relay supports the Prefix Delegation with DHCP (DHCPv6-PD) on the S3700/S5700/S6700 (from V100R006C00). You can view, automatically generate, or manually configure routing information in the DHCPv6-PD table. The routing information in the
DHCPv6-PD table does not get lost after the S3700/S5700/S6700 restarts.

Question 4: Does the DHCP Relay Support Round Robin on the S3700/S5700/S6700?
Question 4 : The S3700/S5700/S6700 supports round robin from the V100R006C00 version. By default, round robin is disabled. You can enable the round robin function by configuring ip relay address cycle in the system view.

Question 5 : When Should the DHCP Server Start to Ping the DHCP Client?
Question 5: From V100R006C00, upon receiving the discover packet, the S3700/S5700/S6700 starts to ping the IP addresses that the DHCP server will assign to the client. The details are in the command of dhcp server ping.



2013年11月28日星期四

How Do I Configure the Telnet Login Function

How Do I Configure the Telnet Login Function?
You can log in to a switch (I use the S2700-26TP-EI-AC most time) through Telnet only when the switch has an IP address and the VTY
user authentication method and VTY user level have been configured. By default, the preceding
configurations are unavailable on the switch, and you must log in to the switch through the
console interface and complete the configurations.
Perform the following configurations:
1. Set a management IP address for the switch.
A # If the switch has an management interface, configure an IP address for the management
interface.
<HUAWEI> system-view
[HUAWEI] interface meth 0/0/1
[HUAWEI-MEth0/0/1] ip address ip address 192.168.1.2 24
[HUAWEI-MEth0/0/1] quit
B # If the switch has no management interface, configure an IP address for the WLANIF
interface.
<HUAWEI> system-view
[HUAWEI] vlan 4094
[HUAWEI-vlan4094] quit
[HUAWEI] interface gigabitethernet 0/0/48
[HUAWEI-GigabitEthernet0/0/48] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/48] port hybrid untagged vlan 4094
[HUAWEI-GigabitEthernet0/0/48] quit
[HUAWEI] interface vlanif 4094
[HUAWEI-Vlanif4094] ip address ip address 192.168.1.2 24
[HUAWEI-Vlanif4094] quit
2. Configure reachable routes between the PC and switch so that the PC can successfully ping
the switch.
A If the PC is directly connected to the switch, ensure that the IP address of the PC is in
the same network segment as the management IP address of the switch.
B If the PC is not directly connected to the switch, configure reachable routes between
the PC and switch.
3. Set the authentication mode for Telnet login to AAA.
[HUAWEI] user-interface vty 0 4
[HUAWEI-ui-vty0-4] authentication-mode aaa
[HUAWEI-ui-vty0-4] quit
4. Configure the Telnet login user parameters. Set the user name and password to admin, and
user level to 3.
[HUAWEI] aaa
[HUAWEI-aaa] local-user admin password cipher admin
[HUAWEI-aaa] local-user admin privilege level 3
[HUAWEI-aaa] local-user admin service-type telnet
Note:
This configuration works for Huawei S2700, Huawei S3700, Huawei S5700 and Huawei S6700.
Want to know more about huawei switch, visit: http://jkemma990.wordpress.com/.


2013年11月25日星期一

The Apply of the Huawei Module

1 business card
Now, access route not only supports the E1, SA and other wide area net card, and with thedegree of integration and ALL-in-One device concept, the two layer switching card, voice card, PON card and so on have access.
Exchange board 24 Gigabit Ethernet Huawei AR G3 support switching port, friends are shocked!
"Sounded the alarm security prism gate" incident on the network, the cryptographic card(data encryption card) is sometimes necessary
Even the same type of card, manufacturers will access density customized various, different access density board different price, buyers can choose according to needs and their own funds.
The same is to realize the function of E1 AR G3, Huawei can provide 1, 2, 4, 8 ports of theE1 card

The board is unceasingly rich, on the one hand makes the original router business greatly expanded at the same time, but also reduce the number of equipment, simplify the network management. Huawei AR G3 currently has as many as nearly 50 kinds of business cardsare available, including the common E1, SA, Ethernet two / three layer, voice card etc..
2 The board hot swap
The board support hot plug, which was originally proposed to telecom equipment requirements. But now with the enterprises and units of office IT comprehensive popularization, the network caused by interruption losses are increasing, more and more attention to the reliability of equipment.
Therefore, for large and medium enterprises, or router network location where the critical(such as access to the key server), the board support hot plug is essential. When a router on the part of the board in the event of a failure or expansion needs to be replaced, do not needto cut off the power of the equipment, direct online card replacement treatment.
To achieve without power to Huawei AR G3 router, hot swapping business cards.

The above is the access level modular access router needs to pay attention, these factors are also the router vendors in the strength of the most important factors. In addition to the factors mentioned above, simple richness, management and maintenance of software functions and protocols supported by (Web network), whether to support the redundant power supplies, and memory are the factors that need to be considered.
Huawei AR G3 series routers not only in several of the above mentioned showed excellent,relying on Huawei in the telecommunications industry, technology accumulation, theequipment reliability, ease of use and richness of business support are leading the industrylevel, and rich, convenient choice, price is relatively high, is the choice of enterprise access level modular router good.
Huawei Access also is one choice of these.
Today the fixed network has entered an ultra-broadband era featuring abundant video services. Broadband is booming worldwide. As a leader in the global access network market, Huawei’s access products cover three main domains: traditional fixed access (MSAN, DSLAM), fiber broadband access (FTTx), fiber and copper infrastructure (ODN and MDF). Huawei SingleFAN broadband access strategy can help customers win in the ultra-broadband era through simplified networking, fast deployment. As a leading Huawei Access Products wholesaler, Huanetwork.com focuses on Huawei EPON Huawei OLT terminals, SmartAX MA5600 (MA5612, MA5616, MA5620, MA5626, MA5631, MA5632, MA5633, MA5669 etc), SmartAX MA5600T (MA5680T and MA5683T) and Huawei access accessories. With sufficient stock, Huanetwork.com can ship Huawei access network products to worldwide in very short time.

More information, please view: http://www.huanetwork.com



2013年11月21日星期四

Safe and Reliable Huawei Switch S5700-28C-EI US$1125.00

Huawei S5700-28C-EI switch with a complete reliable on the protection mechanism, compared to the SI series, it can access a Gigabit server, then link bundling together to upper equipment, more supports wire speed across the VLAN multicast copy function, suitable for all kinds of small and medium-sized enterprises or data center.

The datasheet of S5700-28C-EI
• Need to purchase additional power AC LS5M100PWA00 or DC LS5M100PWD00
• S5700-28C-EI is Huanetwork.com regular stock item
• Non-POE Switch
• Layer 3 Ethernet Switch
• Support 1 Extended Slot
• Port: 24 GE ports
• Software: Enhanced Version
• Intelligent Stacking (iStack)
• Ethernet OAM
• 32K MAC address entries
• Support OSPF OSPF V3 IS-IS IS-ISv6 BGP and BGP 4+
Network standards: IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3x, IEEE802.1Q, IEEE 802.1d, IEEE 802.1X
VLAN: supports 4K VLAN, Guest VLAN, Voice VLAN, support MAC/ protocol /IP subnet /strategy / port based VLAN, support for 1:1 and N:1 VLAN exchange function

The adventage of S5700-28C-EI
It uses 1U chassis design, so it can be used to complete the server stack access, easy to maintain and improve reliability. It supports multiple equivalent routing redundancy realizing uplink routing configuration on the device, when the main uplink routing failure automatically switches to a backup path, realize multilevel backup uplink routing.
The S5700 series Gigabit enterprise switches are next-generation energy-saving switchesdeveloped by Huawei to meet the demand for high-bandwidth access and Ethernet multi-serviceaggregation. Based on cutting-edge hardware and Huawei Versatile Routing Platform (VRP)software, the S5700 provides a large switching capacity and high-density GE ports toaccommodate 10 Gbit/s upstream transmissions.

The S5700-28C-EI price
According to www.huanetwork.com, the best price form, S5700-28C-EI: US$1125.00.

Request a quote for S5700-28C-EI by emailing us at sales@huanetwork.com or pick up thephone and speak to one of our friendly and helpful sales reps at +852-30501940 (Hong Kong).
The similar product S5710-28C-EI price : US$2,554.00