Difference between and forwarding capacity of SRU and MCU A on S series switches


SRU is used in the S7706 and S7712 chassis, and MCU A is used in the S7703 chassis.
For details about the forwarding capacity of a switch, contact the local Huawei office.

Other related questions:
Difference between the S series switch and router
The S series switch and router are different in the following aspects: 1. Functions �?data switching or routing Although both Layer 3 switches and routers provide the routing function, they are not the same. For example, many broadband routers provide not only the routing function, but also switch and firewall functions. However, these routers are equated with switches or firewalls. because routing is their main function while others are additional functions. This rule also applies to Layer 3 switches. They are switching products that mainly provide the data switching function, as well as additional routing function. 2. Applicable environment �?LAN or WAN The routing function of a Layer 3 switch is simple for connection of LANs. Therefore, the routes of a Layer 3 switch are simple and less complex than those of a router. The Layer 3 switch provides quick data switching to allow frequent exchange of data traffic in the LAN. The router is designed to connect different types of networks. Although a router can be applied to the connection of LANs, the routing function is mainly provided for connection of different types of networks, such as connection between the LAN and WAN, and between networks with different protocols. The main purpose of a router is to connect multiple networks with complex routes. With powerful routing function, the router is applied to not only LANs with same protocols, but also LAN and WAN with different protocols. To connect different types of networks, the router provides various interface types. However, the Layer 3 switch only provides LAN interfaces of the same type. 3. Performance �?data packet exchange Technically, the major difference between a router and a Layer 3 switch is to forward data packets. The router uses the software engine with a micro-processor to forward data packets, while the Layer 3 switch uses hardware. After a Layer 3 switch forwards the first packet of a data flow, it generates a mapping between MAC addresses and IP addresses. When the same data flow passes, the Layer 3 switch forwards the packets without searching in the routing table. This prevents the delay caused by route selection and improves the efficiency of forwarding data packets. Therefore, in terms of performance, the Layer 3 switch is better than the router and is applied to the LAN with frequent data exchange. With a powerful routing function and low forwarding efficiency of data packets, the router is applied to the connection of different types of networks without frequent data exchange, such as the connection between the LAN and Internet. If the router is used on a LAN, its powerful routing function is wasted and it cannot meet the communication requirements of the LAN and influences subnet communication.

Difference between CSS and stack on S series switches
For S series switches, both stack and cluster indicate that combine multiple switches are virtualized into a logical switch. In V200R001C00 and earlier versions, there is only one name called stack in Chinese. In later versions, fixed switches use stack and modular switches use the cluster. Each cluster allows only two member devices, whereas a stack can contain a maximum of nine member devices.

Difference between forwarding modes of Layer 2 multicast on an S series switch
After Layer 2 multicast is enabled on an S series switch, the switch maintains a Layer 2 multicast forwarding table. When receiving a multicast packet, the switch matches the multicast address of the packet with multicast forwarding entries to determine the outbound interface. Whether the switch determines the outbound interface based on the multicast IP address or multicast MAC address depends on the configured Layer 2 multicast forwarding mode. Multiple multicast IP addresses may be mapped to one MAC address. If multicast data is forwarded based on the MAC address, multicast data may be sent to the users who do not order the multicast data. MAC address-based multicast forwarding can improve specifications in certain scenarios. Different models support different Layer 2 multicast forwarding modes: - The S1720, S2700SI, S2710SI, S2700EI, S2720, S2750EI, S5700S-LI, and S5700LI support only MAC address-based multicast forwarding. - The S3700SI and S5710-C-LI support only IP address-based multicast forwarding. - The S5700SI supports only IP address-based multicast forwarding in V200R002 and earlier versions, and supports MAC address-based and IP address-based forwarding modes starting from V200R003. - The S3700EI, S3700HI, S5710-X-LI, S5720S-SI, S5720SI, S5700EI, S5710EI, S5720EI, S5700HI, S5710HI, S5720HI, S6700EI, S6720EI, S7700, S9700, S12700, S9300, and E600 support MAC address-based and IP address-based forwarding modes.

What are the differences between 802.1X and DOT1X on S series switch?
802.1X and DOT1X provide the same function.

Differences between IPSG and port security of S series switches
For S series switches (except S1700 switches), both IPSG and port security support bindings between MAC addresses and interfaces. Their differences are as follows: �?IPSG: Binds MAC addresses to interfaces in a binding table so that a host can only go online through a fixed port. The hosts of which MAC addresses are not in the binding table cannot go online through the switch. IPSG prevents IP address spoofing attacks. For example, it prevents a malicious host from stealing an authorized host's IP address to access or attack the network. �?Port security: Converts limited number of dynamic MAC entries learned by interfaces into secure MAC entries, so that a host can only go online through a fixed port. The hosts of which MAC addresses are not in the MAC address table cannot go online through the switch. Port security prevents access of unauthorized hosts and limits the number of access hosts. It is applicable to networks with a large number of hosts. If you just want to prevent hosts with unauthorized MAC addresses from communicating with each other and a large number of hosts reside on the network, port security is recommended.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top