Cisco 350 Series switches provide the advanced feature set that growing businesses require and that highbandwidth applications and technologies demand. These switches can improve the availability of your critical applications, protect your business information, and optimize your network bandwidth to more effectively deliver information and support applications. The switches provide the following benefits.
Whether you need a basic high-performance network to connect employee computers or a solution to deliver data, voice, and video services, the Cisco 350 Series offers a solution to meet your needs. Possible deployment scenarios include:
- Secure desktop connectivity: Cisco 350 Series Switches can simply and securely connect employees working in small offices with each other and with all of the servers, printers, and other devices they use. High performance and reliable connectivity help speed file transfers and data processing, improve network uptime, and keep your employees connected and productive.
- Secure wireless connectivity: With its advanced security features, Power over Ethernet, Auto Smartports, QoS, VLAN, and access control features, the Cisco 350 Series Switches are the perfect foundation to add business-grade wireless to a business network.
- Unified communications: As a managed network solution, the Cisco 350 Series provides the performance and advanced traffic-handling intelligence you need to deliver all communications and data over a single network. Cisco offers a complete portfolio of IP telephony and other unified communications products designed for businesses. Cisco 350 Series Switches have been rigorously tested to help ensure easy integration and full compatibility with these and other products, providing a complete business solution.
- Highly secure guest connectivity: Cisco 350 Series Switches let you extend highly secure network connectivity to guests in a variety of settings, such as a hotel, an office waiting room, or any other area open to nonemployee users. Using powerful but easy-to-configure security and traffic segmentation capabilities, you can isolate your vital business traffic from guest services and keep guests’ network sessions private from each other.
High reliability and resiliency
In a growing business where availability 24 hours a day, 7 days a week is critical, you need to assure that employees can always access the data and resources they need. The Cisco 350 Series supports dual images, allowing you to perform software upgrades without having to take the network offline or worry about the
network going down during the upgrade.
Cisco 350 Series switches provide the advanced security features you need to protect your business data and keep unauthorized users off the network:
- Embedded Secure Sockets Layer (SSL) encryption protects management data traveling to and from the switch.
- Extensive Access Control Lists (ACLs) restrict sensitive portions of the network to keep out unauthorized users and guard against network attacks.
- Guest VLANs let you provide Internet connectivity to nonemployee users while isolating critical business services from guest traffic.
- Support for advanced network security applications such as IEEE 802.1X port security tightly limits access to specific segments of your network. Web-based authentication provides a consistent interface to authenticate all types of host devices and operating systems, without the complexity of deploying IEEE 802.1X clients on each endpoint.
- Advanced defense mechanisms, including dynamic Address Resolution Protocol (ARP) inspection, IP Source Guard, and Dynamic Host Configuration Protocol (DHCP) snooping, detect and block deliberate network attacks. Combinations of these protocols are also referred to as IP-MAC port binding (IPMB).
- IPv6 First Hop Security extends the advanced threat protection to IPv6. This comprehensive security suite includes ND inspection, RA guard, DHCPv6 guard, and neighbor binding integrity check, providing unparalleled protection against a vast range of address spoofing and man-in-the-middle attacks on IPv6 networks.
- Time-based ACLs and port operation restrict access to the network during predesignated times such as business hours.
- Uniform MAC address-based security can be applied automatically to mobile users as they roam between wireless access points.
- Secure Core Technology (SCT) helps ensure that the switch is able to process management traffic in the face of a Denial-of-Service (DoS) attack.
- Private VLAN Edge (PVE) provides Layer 2 isolation between devices on the same VLAN.
- Storm control can be applied to broadcast, multicast, and unknown unicast traffic.
- Protection of management sessions occurs using RADIUS, TACACS+, and local database authentication as well as secure management sessions over SSL, SSH, and SNMPv3.
- DoS attack prevention maximizes network uptime in the presence of an attack.
Power over Ethernet
Cisco 350 Series Switches are available with up to 48 PoE ports. This capability simplifies advanced technology deployments such as IP telephony, wireless, and IP surveillance by allowing you to connect and power network endpoints over a single Ethernet cable. With no need to install separate power supplies for IP phones or wireless access points, you can take advantage of advanced communications technologies more quickly and at a lower cost. Models support 802.3af PoE, 802.3at PoE+, and 60 Watt PoE.
Network needs are changing quickly. Thanks to evolving wireless standards and the rising number of wireless devices, keeping up with data rates and growing traffic can be a challenge. Your traditional Ethernet infrastructure can support speeds up to 1 Gigabit per second (Gbps), but competing today requires much more capacity. One option is completely replacing your older cabling infrastructure and upgrading your hardware. But wouldn’t it be better to increase network speed and traffic capacity in a way that’s quick, inexpensive, and efficient? Cisco’s new Multigigabit Ethernet switches offer just that: an easy-to deploy, budget-friendly solution that allows you to increase network speed and bandwidth using your existing cables. By partnering with other industry leaders to form the NBASE-T Alliance, Cisco uses NBASE-T technology to help you get more out of your existing infrastructure. Save time and money by avoiding upgrades and extending the life of your installed cable plants. And discover the benefits of meeting consumer demand for increased bandwidth and speeds without a large initial investment. Multigigabit Ethernet technology uses capabilities in your existing cabling infrastructure to meet bandwidth requirements and provide up to five times the performance. The technology enables intermediate data rates of 2.5 and 5 Gbps to ease the jump between traditional rates of 1 Gbps and 10 Gbps. These intermediate rates run on most installed cables and preserve older UTP wiring, which is good for 802.11ac wireless LAN applications. The technology also supports Power over Ethernet (PoE) forms, including PoE+ and 60W PoE. Cisco Multigigabit Ethernet switches help you avoid having to run multiple cables between switches and access points and let your networks welcome next-generation traffic speeds and data rates.
Network wide automatic voice deployment
Using a combination of Cisco Discovery Protocol, LLDP-MED, Auto Smartports, and Voice Services Discovery Protocol (or VSDP, a unique Cisco protocol), customers can deploy an end-to-end voice network dynamically. The switches in the network automatically converge around a single voice VLAN and QoS parameters and then propagate them out to the phones on the ports, where they are discovered. For example, automated voice VLAN capabilities let you plug any IP phone (including third-party phones) into your IP telephony network and receive an immediate dial tone. The switch automatically configures the device with the right VLAN and QoS parameters to prioritize voice traffic.
As the IP address scheme evolves to accommodate a growing number of network devices, the Cisco 350 Series can support the transition to the next generation of networking and operating systems such as Windows 8, Vista, and Linux. These switches continue to support previous-generation IPv4, allowing you to evolve to the new IPv6 standard at your own pace and helping ensure that your current network will continue to support your business applications in the future. Cisco 350 Series switches have successfully completed rigorous IPv6 testing and have received the USGv6 and IPv6 Gold certification.
Advanced layer 3 traffic management
The Cisco 350 Series enables a more advanced set of traffic management capabilities to help growing businesses organize their networks more effectively and efficiently. For example, the switches provide static LAN Layer 3 routing, allowing you to segment your network into workgroups and communicate across VLANs without degrading application performance. With these capabilities, you can boost the efficiency of your network by offloading internal traffic-handling tasks from your router and allowing it to manage primarily external traffic and security.
The Cisco 350 Series integrates a variety of power-saving features across all models, providing the industry’s most extensive energy-efficient switching portfolio. These switches are designed to conserve energy by optimizing power use, which helps protects the environment and reduce your energy costs. They provide an eco-friendly network solution without compromising performance. Cisco 350 Series switches feature:
- Support for the Energy Efficient Ethernet (IEEE 802.3az) standard, which reduces energy consumption by monitoring the amount of traffic on an active link and putting the link into a sleep state during quiet periods.
- The latest Application-Specific Integrated Circuits (ASICs).
- Automatic power shutoff on ports when a link is down.
- LEDs that can be turned off to save power.
- Embedded intelligence to adjust signal strength based on the length of the connecting cable.
Capacity in Millions of Packets per Second (mpps) (64-byte packets)
Switching Capacity in Gigabits per Second (Gbps)
Layer 2 Switching
Spanning Tree Protocol
- Standard 802.1d Spanning Tree support.
- Fast convergence using 802.1w (Rapid Spanning Tree [RSTP]), enabled by default Multiple Spanning Tree instances using 802.1s (MSTP); 8 instances are supported Per-VLAN Spanning Tree Plus (PVST+) and Rapid PVST+ (RPVST+); 126 instances are supported.
- Support for IEEE 802.3ad Link Aggregation Control Protocol (LACP).
- Up to 8 groups.
- Up to 8 ports per group with 16 candidate ports for each (dynamic) 802.3ad link aggregation.
- Support for up to 4,094 VLANs simultaneously
- Port-based and 802.1Q tag-based VLANs; MAC-based VLAN; protocol-based VLAN; IP subnet-based VLAN,
- Management VLAN
- Private VLAN with promiscuous, isolated, and community port
- Private VLAN Edge (PVE), also known as protected ports, with multiple uplinks
- Guest VLAN; unauthenticated VLAN
- Dynamic VLAN assignment via RADIUS server along with 802.1x client authentication
- CPE VLAN
- Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS.
- Auto voice capabilities deliver network wide zero-touch deployment of voice endpoints and call control devices.
Multicast TV VLAN
Multicast TV VLAN allows the single multicast VLAN to be shared in the network while subscribers remain in separate VLANs. This feature is also known as Multicast VLAN Registration (MVR).
Support for VLAN One-to-One Mapping. In VLAN One-to-One Mapping, on an edge interface C-VLANs are mapped to S-VLANs and the original C-VLAN tags are replaced by the specified S-VLAN
VLANs transparently cross a service provider network while isolating traffic among customers.
- Selective Q-in-Q is an enhancement to the basic Q-in-Q feature and provides, per edge interface, multiple mappings of different C-VLANs to separate S-VLANs.
- Selective Q-in-Q also allows configuring of Ethertype (TPID) of the S-VLAN tag.
- Layer 2 protocol tunneling over Q-in-Q is also supported.
Generic VLAN Registration Protocol (GVRP)/Generic Attribute Registration Protocol (GARP)
- Generic VLAN Registration Protocol (GVRP) and Generic Attribute Registration Protocol (GARP) enable automatic propagation and configuration of VLANs in a bridged domain.
Unidirectional Link Detection (UDLD)
- UDLD monitors physical connection to detect unidirectional links caused by incorrect wiring or cable/port faults to prevent forwarding loops and blackholing of traffic in switched networks
Dynamic Host Configuration Protocol (DHCP) Relay at Layer 2
- Relay of DHCP traffic to DHCP server in different VLAN; works with DHCP Option 82.
Internet Group Management Protocol (IGMP) versions 1, 2, and 3 snooping
- IGMP limits bandwidth-intensive multicast traffic to only the requesters; supports 2K multicast groups (source-specific multicasting is also supported)
- IGMP querier is used to support a Layer 2 multicast domain of snooping switches in the absence of a multicast router
Head-Of-Line (HOL) blocking
- HOL blocking prevention
- Loopback detection provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of STP
- Wirespeed routing of IPv4 packets.
- Up to 990 static routes and up to 128 IP interfaces.
- Wirespeed routing of IPv6 packets
Layer 3 Interface
- Configuration of Layer 3 interface on physical port, LAG, VLAN interface, or loopback interface
Classless Interdomain Routing (CIDR)
- Support for classless interdomain routing
Policy-Based Routing (PBR)
- Flexible routing control to direct packets to different next hop based on IPv4 or IPv6 ACL.
- Switch functions as an IPv4 DHCP server serving IP addresses for multiple DHCP pools/scopes.
- Support for DHCP options.
DHCP relay at Layer 3
- Relay of DHCP traffic across IP domains.
User Datagram Protocol (UDP) relay
- Relay of broadcast information across Layer 3 domains for application discovery or relaying of bootP/DHCP packets.
Secure Shell (SSH) Protocol
- SSH is a secure replacement for Telnet traffic. SCP also uses SSH. SSH v1 and v2 are supported.
Secure Sockets Layer (SSL)
- SSL support: Encrypts all HTTPS traffic, allowing highly secure access to the browserbased management GUI in the switch.
IEEE 802.1X (Authenticator role)
- 802.1X: RADIUS authentication and accounting, MD5 hash; guest VLAN; unauthenticated VLAN, single/multiple host mode and single/multiple sessions.
- Supports time-based 802.1X.
- Dynamic VLAN assignment.
- Web based authentication provides network admission control through web browser to any host devices and operating systems.
STP Bridge Protocol Data Unit (BPDU) Guard
- A security mechanism to protect the network from invalid configurations. A port enabled for BPDU Guard is shut down if a BPDU message is received on that port.
STP Root Guard
- This prevents edge devices not in the network administrator’s control from becoming Spanning Tree Protocol root nodes.
STP loopback guard
- Provides additional protection against Layer 2 forwarding loops (STP loops).
- Filters out DHCP messages with unregistered IP addresses and/or from unexpected or untrusted interfaces. This prevents rogue devices from behaving as DHCP Servers.
IP Source Guard (IPSG)
- When IP Source Guard is enabled at a port, the switch filters out IP packets received from the port if the source IP addresses of the packets have not been statically configured or dynamically learned from DHCP snooping. This prevents IP Address Spoofing.
Dynamic ARP Inspection (DAI)
- The switch discards ARP packets from a port if there are no static or dynamic IP/MAC bindings or if there is a discrepancy between the source or destination addresses in the ARP packet. This prevents man-in-the-middle attacks.
IP/MAC/Port Binding (IPMB)
- The preceding features (DHCP Snooping, IP Source Guard, and Dynamic ARP Inspection) work together to prevent DOS attacks in the network, thereby increasing network availability.
Secure Core Technology (SCT)
- Makes sure that the switch will receive and process management and protocol traffic no matter how much traffic is received.
Secure Sensitive Data (SSD)
- A mechanism to manage sensitive data (such as passwords, keys, and so on) securely on the switch, populating this data to other devices, and secure auto config. Access to view the sensitive data as plaintext or encrypted is provided according to the user-configured access level and the access method of the user.
- Trustworthy systems provide a highly secure foundation for Cisco products.
- Run-time defenses (Executable Space Protection [X-Space], Address Space Layout Randomization [ASLR], Built-In Object Size Checking [BOSC]).
- Private VLAN provides security and isolation between switch ports, which helps ensure that users cannot snoop on other users’ traffic; supports multiple uplinks.
Layer 2 isolation Private VLAN Edge (PVE) with community VLAN
- PVE (also known as protected ports) provides Layer 2 isolation between devices in the same VLAN, supports multiple uplinks.
- Ability to lock source MAC addresses to ports and limits the number of learned MAC addresses.
- Supports RADIUS and TACACS authentication. Switch functions as a client.
- The RADIUS accounting functions allow data to be sent at the start and end of services, indicating the amount of resources (such as time, packets, bytes, and so on) used during the session.
- Broadcast, multicast, and unknown unicast.
- Denial-Of-Service (DOS) attack prevention
Multiple user privilege levels in CLI
- Level 1, 7, and 15 privilege levels
- Support for up to 1K rules.
- Drop or rate limit based on source and destination MAC, VLAN ID or IPv4 or IPv6 address, IPv6 flow label, protocol, port, Differentiated Services Code Point (DSCP)/IP precedence, TCP/UDP source and destination ports, 802.1p priority, Ethernet type, Internet Control Message Protocol (ICMP) packets, IGMP packets, TCP flag; ACL can be applied on both ingress and egress sides.
- Time-based ACLs supported.
Quality of Service
- 8 hardware queues
- Strict priority and Weighted Round-Robin (WRR).
- Queue assignment based on DSCP and class of service (802.1p/CoS).
Class of service
- Port based; 802.1p VLAN priority based; IPv4/v6 IP precedence/Type of Service (ToS)/DSCP based; Differentiated Services (DiffServ); classification and remarking ACLs, trusted QoS.
- Queue assignment based on DSCP and class of service (802.1p/CoS).
- Ingress policer; egress shaping and rate control; per VLAN, per port, and flow based; 2R3C policing.
- A TCP congestion avoidance algorithm is required to minimize and prevent global TCP loss synchronization.
- IEEE 802.3 10BASE-T Ethernet, IEEE 802.3u 100BASE-TX Fast Ethernet, IEEE 802.3ab 1000BASE-T Gigabit Ethernet, IEEE 802.3ad Link Aggregation Control Protocol, IEEE 802.3z Gigabit Ethernet, IEEE 802.3x Flow Control, IEEE 802.1D (STP, GARP, and GVRP), IEEE 802.1Q/p VLAN, IEEE 802.1w Rapid STP, IEEE 802.1s Multiple STP, IEEE 802.1X Port Access Authentication, IEEE 802.3af, IEEE 802.3at, IEEE 802.1AB Link Layer Discovery Protocol, IEEE 802.3az Energy Efficient Ethernet, RFC 768, RFC 783, RFC 791, RFC 792, RFC 793, RFC 813, RFC 826, RFC 879, RFC 896, RFC 854, RFC 855, RFC 856, RFC 858, RFC 894, RFC 919, RFC 920, RFC 922, RFC 950, RFC 951, RFC 1042, RFC 1071, RFC 1123, RFC 1141, RFC 1155, RFC 1157, RFC 1213, RFC 1215, RFC 1286, RFC 1350, RFC 1442, RFC 1451, RFC 1493, RFC 1533, RFC 1541, RFC 1542, RFC 1573, RFC 1624, RFC 1643, RFC 1700, RFC 1757, RFC 1867, RFC 1907, RFC 2011, RFC 2012, RFC 2013, RFC 2030, RFC 2131, RFC 2132, RFC 2233, RFC 2576, RFC 2616, RFC 2618, RFC 2665, RFC 2666, RFC 2674, RFC 2737, RFC 2819, RFC 2863, RFC 3164, RFC 3176, RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 4330.
- IPv6 host mode; IPv6 over Ethernet; Dual IPv6/IPv4 stack.
- IPv6 neighbor and router discovery (ND); IPv6 stateless address autoconfiguration; Path Maximum Transmission Unit (MTU) discovery.
- Duplicate Address Detection (DAD); ICMP version 6
DHCPv6 stateful client.
- IPv6 over IPv4 network with Intrasite Automatic Tunnel Addressing Protocol (ISATAP) tunnel support.
- USGv6 and IPv6 Gold Logo certified
- Prioritize IPv6 packets in hardware
- Drop or rate limit IPv6 packets in hardware
IPv6 First Hop Security
- RA guard.
- ND inspection.
- DHCPv6 guard.
- Neighbor binding table (snooping and static entries).
- Neighbor binding integrity check.
Multicast Listener Discovery (MLD v1/2) snooping
- Deliver IPv6 multicast packets only to the required receivers.
- Web/SSL, Telnet server/SSH, ping, traceroute, Simple Network Time Protocol (SNTP), Trivial File Transfer Protocol (TFTP), SNMP, RADIUS, syslog, DNS client, Telnet Client, DHCP Client, DHCP Autoconfig, IPv6 DHCP Relay, TACACS+.
IPv6 RFCs supported
- RFC 4443 (which obsoletes RFC2463): ICMP version 6.
- RFC 4291 (which obsoletes RFC 3513): IPv6 address architecture.
- RFC 4291: IPv6 addressing architecture.
- RFC 2460: IPv6 specification.
- RFC 4861 (which obsoletes RFC 2461): neighbor discovery for IPv6.
- RFC 4862 (which obsoletes RFC 2462): IPv6 stateless address auto configuration.
- RFC 1981: path MTU discovery.
- RFC 4007: IPv6 scoped address architecture.
- RFC 3484: default address selection mechanism.
- RFC 5214 (which obsoletes RFC 4214): ISATAP tunneling.
- RFC 4293: MIB IPv6: textual conventions and general group.
- RFC 3595: textual conventions for IPv6 flow label.