button1-blue

button2-blue2

button3-blue2

HP 5830 Switch Series

The HP 5830AF Switch Series is a family of high-density 1 GbE top-of-rack data center and  switches that are a part of the HP FlexFabric solution module of the HP FlexNetwork architecture. The two models, the 5830AF-48G and 5830AF-96G switches, are ideally suited for deployments at the server access layer in medium-sized and large enterprise data centers and campus networks. The HP 5830AF-48G Switch delivers 48 1-GbE ports and up to four 10-GbE ports in a space-saving 1RU package, while the HP 5830AF-96G Switch provides an industry-leading 96 1-GbE ports and up to 10 10-GbE uplink ports in a 2RU form factor.

HP 5830 Switch Series

HP 5830 Switch Series

  • Stackable, high port density for high scalability
  • HP IRF technology for simpler two-tier networks
  • Ultradeep (1 Gb and 3 GB) packet buffers
  • Full L2/L3 features, IPv4 and IPv6 dual stack
  • Lower OpEx and greener data centers

Resources

Quality of Service (QoS)

  • Traffic policing — supports Committed Access Rate (CAR) and line rate
  • Powerful QoS feature — creates traffic classes based on access control lists (ACLs), IEEE 802.1p precedence, IP, DSCP, or Type of Service (ToS) precedence; supports filter, redirect, mirror, or remark; supports the following congestion actions: strict priority (SP) queuing, weighted round robin (WRR), weighted fair queuing (WFQ), weighted random early discard (WRED), SP+WRR, and SP+WFQ

Management

  • sFlow (RFC 3176) — provides scalable ASIC-based wire-speed network monitoring and accounting with no impact on network performance; this allows network operators to gather a variety of sophisticated network statistics and information for capacity planning and real-time network monitoring purposes
  • Remote configuration and management — is available through a secure Web browser or a command-line interface (CLI)
  • Manager and operator privilege levels — enable read-only (operator) and read/write (manager) access on CLI and Web browser management interfaces
  • Management VLAN — segments traffic to and from management interfaces, including CLI/telnet, a Web browser interface, and SNMP
  • Multiple configuration files — can be stored to the flash image
  • Secure Web GUI — provides a secure, easy-to-use graphical interface for configuring the module via HTTPS
  • SNMPv1, v2c, and v3 — facilitate centralized discovery, monitoring, and secure management of networking devices
  • Remote monitoring (RMON) — uses standard SNMP to monitor essential network functions; supports events, alarm, history, and statistics group plus a private alarm extension group
  • Network Time Protocol (NTP) — synchronizes timekeeping among distributed time servers and clients; keeps consistent timekeeping among all clock-dependent devices within the network so that the devices can provide diverse applications based on the consistent time
  • Out-of band-interface — isolates management traffic from user data plane traffic for complete isolation and total reachability, no matter what happens in the data plane
  • Remote intelligent mirroring — mirrors ingress/egress ACL-selected traffic from a switch port or VLAN to a local or remote 8200, 6600, 6200, 5400, or 3500 switch port anywhere on the network

Connectivity

  • Jumbo frames — on Gigabit Ethernet and 10-Gigabit ports, they allow high-performance remote backup and disaster recovery services
  • Auto-MDIX — automatically adjusts for straight-through or crossover cables on all 10/100/1000 ports
  • IPv6 native support 
    • IPv6 host — enables switches to be managed and deployed at the IPv6 network's edge
    • Dual stack (IPv4 & IPv6) — transitions from IPv4 to IPv6, supporting connectivity for both protocols
    • Multicast Listener Discovery (MLD) snooping — IPv6 multicast traffic to the appropriate interface
    • IPv6 ACL/QoS — supports ACL and QoS for IPv6 network traffic, preventing traffic flooding
    • IPv6 routing — supports IPv6 static routes, RIP,BGP4+v6, IS-ISv6 and OSPF routing protocols

Performance

  • Extraordinarily high port density — is a single box-type switch that can provide 96 GbE ports and 10 10-GbE ports simultaneously with full line-rate switching and forwarding
  • Ultradeep packet buffering — provides up to a 3G packet buffer to eliminate network congestion at the I/O associated with heavy use of server virtualization, as well as bursty multimedia, storage applications, and other critical services.
  • Hardware-based wire-speed access control lists (ACLs) — feature-rich ACL implementation (TCAM-based) helps ensure high levels of security and ease of administration without impacting network performance
  • Local Address Resolution Protocol (ARP) — ARP fast reply feature provides an outstanding utilization of air-interface resources by first issuing an ARP request locally before the AP broadcasts over the radio interface

Resiliency and high availability

  • Device Link Detection Protocol (DLDP) — monitors link connectivity and shuts down ports at both ends if unidirectional traffic is detected, preventing loops in STP-based networks
  • Virtual Router Redundancy Protocol (VRRP) — allows groups of two routers to dynamically back each other up to create highly available routed environments
  • Intelligent Resilient Framework (IRF) — creates virtual resilient switching fabrics, where two or more switches perform as a single Layer 2 switch and Layer 3 router; switches do not have to be co-located and can be part of a disaster-recovery system; servers or switches can be attached using standard LACP for automatic load balancing and high availability; simplifies network operation by eliminating the complexity of Spanning Tree Protocol, Equal-Cost Multipath (ECMP), or VRRP
  • Rapid Ring Protection Protocol (RRPP) — connects multiple switches in a high-performance ring using standard Ethernet technology; traffic can be rerouted around the ring in less than 200 ms, reducing the impact on traffic and applications
  • Smart link — allows 200 ms failover between links
  • Data center optimized design — supports front-to-back/back-to-front airflow for hot/cold aisles, rear rack mounts, and redundant hot-swappable AC or DC power and fans
  • Troubleshooting — ingress and egress port monitoring enable network problem solving

Layer 2 switching

  • Spanning Tree/MSTP and RSTP — prevent network loops
  • Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) protocol snooping — effectively control and manage the flooding of multicast packets in a Layer 2 network
  • 32K MAC addresses — provide access to many Layer 2 devices
  • IEEE 802.1ad QinQ and Selective QinQ — increase the scalability of an Ethernet network by providing a hierarchical structure; connect multiple LANs on a high-speed campus or metro network
  • 10 GbE port aggregation — allows grouping of ports to increase overall data throughput to a remote device
  • Port isolation — increases security by isolating ports within a VLAN while still allowing them to communicate with other VLANs
  • Per-VLAN Spanning Tree Plus (PVST+) — allows each virtual LAN (VLAN) to build a separate spanning tree to improve link bandwidth usage in network environments where multiple VLANs exist
  • GVRP VLAN Registration Protocol — allows automatic learning and dynamic assignment of VLANs

Layer 3 services

  • Loopback interface address — defines an address in Routing Information Protocol (RIP) and OSPF that can always be reachable, improving diagnostic capability
  • User Datagram Protocol (UDP) helper function — allows UDP broadcasts to be directed across router interfaces to specific IP unicast or subnet broadcast addresses and prevents server spoofing for UDP services such as DHCP
  • Route maps — provide more control during route redistribution; allow filtering and altering of route metrics
  • Dynamic Host Configuration Protocol (DHCP) — simplifies the management of large IP networks and supports client and server; DHCP Relay enables DHCP operation across subnets

Layer 3 routing

  • IPv6 tunneling — is an important element for the transition from IPv4 to IPv6; allows IPv6 packets to traverse IPv4-only networks by encapsulating the IPv6 packet into a standard IPv4 packet; supports manually configured, 6to4, and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) tunnels
  • Bidirectional Forwarding Detection (BFD) — enables link connectivity monitoring and reduces network convergence time for RIP, OSPF, BGP, IS-IS, VRRP, and IRF
  • Policy-based routing — makes routing decisions based on policies set by the network administrator
  • IGMPv1, v2, and v3 — allow individual hosts to be registered on a particular VLAN
  • PIM-SSM, PIM-DM, and PIM-SM (for IPv4 and IPv6) — support IP Multicast address management and inhibition of DoS attacks
  • Layer 3 IPv4 routing — provides routing of IPv4 at media speed; supports static routes, RIP and RIPv2, OSPF, IS-IS, and BGP
  • Equal-Cost Multipath (ECMP) — enables multiple equal-cost links in a routing environment to increase link redundancy and scale bandwidth
  • Layer 3 IPv6 routing — provides routing of IPv6 at media speed; supports static routes, RIPng, OSPFv3, IS-ISv6, and MP-BGP

Security

  • Access control lists (ACLs) — provide IP Layer 3 filtering based on source/destination IP address/subnet and source/destination TCP/UDP port number
  • Secure Shell — encrypts all transmitted data for secure remote CLI access over IP networks
  • Port security — allows access only to specified MAC addresses, which can be learned or specified by the administrator
  • Secure FTP — allows secure file transfer to and from the switch; protects against unwanted file downloads or unauthorized copying of a switch configuration file
  • Secure management access — securely encrypts all access methods (CLI, GUI, or MIB) through SSHv2, SSL, and/or SNMPv3
  • Identity-driven security and access control 
    • Per-user ACLs — permits or denies user access to specific network resources based on user identity, location, and time of day, allowing multiple types of users on the same network to access specific network services without risk to network security or unauthorized access to sensitive data
    • Automatic VLAN assignment — automatically assigns users to the appropriate VLAN based on their identity and location, and the time of day
  • STP BPDU port protection — blocks Bridge Protocol Data Units (BPDUs) on ports that do not require BPDUs, preventing forged BPDU attacks
  • DHCP protection — blocks DHCP packets from unauthorized DHCP servers, preventing denial-of-service attacks
  • Dynamic ARP protection — blocks ARP broadcasts from unauthorized hosts, preventing eavesdropping or theft of network data
  • STP Root Guard — protects the root bridge from malicious attacks or configuration mistakes
  • Guest VLAN — similar to IEEE 802.1X, it provides a browser-based environment to authenticated clients
  • MAC-based authentication — allows or denies access to the switch based on a client MAC address
  • IP Source Guard — helps prevent IP spoofing attacks
  • Endpoint Admission Defense (EAD) — provides security policies to users accessing a network
  • RADIUS/HWTACACS — eases switch management security administration by using a password authentication server

Convergence

  • IP multicast snooping (data-driven IGMP) — automatically prevents flooding of IP multicast traffic
  • IEEE 802.1AB Link Layer Discovery Protocol (LLDP) — is an automated device discovery protocol that provides easy mapping of network management applications
  • Internet Group Management Protocol (IGMP) — is used by IP hosts to establish and maintain multicast groups; supports IGMPv1, v2, and v3; utilizes Any-Source Multicast (ASM) or Source-Specific Multicast (SSM) to manage IPv4 multicast networks
  • Protocol Independent Multicast (PIM) — is used for IPv4 and IPv6 multicast applications; supports PIM Dense Mode (PIM-DM), Sparse Mode (PIM-SM), and Source-Specific Mode (PIM-SSM)
  • Multicast Source Discovery Protocol (MSDP) — is used for inter-domain multicast applications, allowing multiple PIM-SM domains to interoperate
  • Multicast Border Gateway Protocol (MBGP) — allows multicast traffic to be forwarded across BGP networks and kept separate from unicast traffic
  • Multicast VLAN — allows multiple VLANs to receive the same IPv4 or IPv6 multicast traffic, reducing network bandwidth demand by eliminating multiple streams to each VLAN
  • LLDP-MED — is a standard extension that automatically configures network devices, including LLDP-capable IP phones
  • LLDP-CDP compatibility — receives and recognizes CDP packets from Cisco's IP phones for seamless interoperation

Monitor and diagnostics

  • Port mirroring — enables traffic on a port to be simultaneously sent to a network analyzer for monitoring
  • OAM (802.3ah) — detects data link layer problems that occurred in the "last mile"; monitors the status of the link between the two devices
  • CFD (802.1ag) — connectivity fault detection (CFD) provides a Layer 2 link OAM (operations, administration, and maintenance) mechanism used for link connectivity detection and fault locating

Additional information

  • Green initiative support — provides support for RoHS and WEEE regulations
  • Green IT and power — use the latest advances in silicon development, shut off unused ports, and use variable-speed fans to improve energy efficiency

Quality of Service (QoS)

  • Traffic policing — supports Committed Access Rate (CAR) and line rate
  • Powerful QoS feature — creates traffic classes based on access control lists (ACLs), IEEE 802.1p precedence, IP, DSCP, or Type of Service (ToS) precedence; supports filter, redirect, mirror, or remark; supports the following congestion actions: strict priority (SP) queuing, weighted round robin (WRR), weighted fair queuing (WFQ), weighted random early discard (WRED), SP+WRR, and SP+WFQ

Management

  • sFlow (RFC 3176) — provides scalable ASIC-based wire-speed network monitoring and accounting with no impact on network performance; this allows network operators to gather a variety of sophisticated network statistics and information for capacity planning and real-time network monitoring purposes
  • Remote configuration and management — is available through a secure Web browser or a command-line interface (CLI)
  • Manager and operator privilege levels — enable read-only (operator) and read/write (manager) access on CLI and Web browser management interfaces
  • Management VLAN — segments traffic to and from management interfaces, including CLI/telnet, a Web browser interface, and SNMP
  • Multiple configuration files — can be stored to the flash image
  • Secure Web GUI — provides a secure, easy-to-use graphical interface for configuring the module via HTTPS
  • SNMPv1, v2c, and v3 — facilitate centralized discovery, monitoring, and secure management of networking devices
  • Remote monitoring (RMON) — uses standard SNMP to monitor essential network functions; supports events, alarm, history, and statistics group plus a private alarm extension group
  • Network Time Protocol (NTP) — synchronizes timekeeping among distributed time servers and clients; keeps consistent timekeeping among all clock-dependent devices within the network so that the devices can provide diverse applications based on the consistent time
  • Out-of band-interface — isolates management traffic from user data plane traffic for complete isolation and total reachability, no matter what happens in the data plane
  • Remote intelligent mirroring — mirrors ingress/egress ACL-selected traffic from a switch port or VLAN to a local or remote 8200, 6600, 6200, 5400, or 3500 switch port anywhere on the network

Connectivity

  • Jumbo frames — on Gigabit Ethernet and 10-Gigabit ports, they allow high-performance remote backup and disaster recovery services
  • Auto-MDIX — automatically adjusts for straight-through or crossover cables on all 10/100/1000 ports
  • IPv6 native support 
    • IPv6 host — enables switches to be managed and deployed at the IPv6 network's edge
    • Dual stack (IPv4 & IPv6) — transitions from IPv4 to IPv6, supporting connectivity for both protocols
    • Multicast Listener Discovery (MLD) snooping — IPv6 multicast traffic to the appropriate interface
    • IPv6 ACL/QoS — supports ACL and QoS for IPv6 network traffic, preventing traffic flooding
    • IPv6 routing — supports IPv6 static routes, RIP,BGP4+v6, IS-ISv6 and OSPF routing protocols

Performance

  • Extraordinarily high port density — is a single box-type switch that can provide 96 GbE ports and 10 10-GbE ports simultaneously with full line-rate switching and forwarding
  • Ultradeep packet buffering — provides up to a 3G packet buffer to eliminate network congestion at the I/O associated with heavy use of server virtualization, as well as bursty multimedia, storage applications, and other critical services.
  • Hardware-based wire-speed access control lists (ACLs) — feature-rich ACL implementation (TCAM-based) helps ensure high levels of security and ease of administration without impacting network performance
  • Local Address Resolution Protocol (ARP) — ARP fast reply feature provides an outstanding utilization of air-interface resources by first issuing an ARP request locally before the AP broadcasts over the radio interface

Resiliency and high availability

  • Device Link Detection Protocol (DLDP) — monitors link connectivity and shuts down ports at both ends if unidirectional traffic is detected, preventing loops in STP-based networks
  • Virtual Router Redundancy Protocol (VRRP) — allows groups of two routers to dynamically back each other up to create highly available routed environments
  • Intelligent Resilient Framework (IRF) — creates virtual resilient switching fabrics, where two or more switches perform as a single Layer 2 switch and Layer 3 router; switches do not have to be co-located and can be part of a disaster-recovery system; servers or switches can be attached using standard LACP for automatic load balancing and high availability; simplifies network operation by eliminating the complexity of Spanning Tree Protocol, Equal-Cost Multipath (ECMP), or VRRP
  • Rapid Ring Protection Protocol (RRPP) — connects multiple switches in a high-performance ring using standard Ethernet technology; traffic can be rerouted around the ring in less than 200 ms, reducing the impact on traffic and applications
  • Smart link — allows 200 ms failover between links
  • Data center optimized design — supports front-to-back/back-to-front airflow for hot/cold aisles, rear rack mounts, and redundant hot-swappable AC or DC power and fans

Manageability

  • Troubleshooting — ingress and egress port monitoring enable network problem solving

Layer 2 switching

  • Spanning Tree/MSTP and RSTP — prevent network loops
  • Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) protocol snooping — effectively control and manage the flooding of multicast packets in a Layer 2 network
  • 32K MAC addresses — provide access to many Layer 2 devices
  • IEEE 802.1ad QinQ and Selective QinQ — increase the scalability of an Ethernet network by providing a hierarchical structure; connect multiple LANs on a high-speed campus or metro network
  • 10 GbE port aggregation — allows grouping of ports to increase overall data throughput to a remote device
  • Port isolation — increases security by isolating ports within a VLAN while still allowing them to communicate with other VLANs
  • Per-VLAN Spanning Tree Plus (PVST+) — allows each virtual LAN (VLAN) to build a separate spanning tree to improve link bandwidth usage in network environments where multiple VLANs exist
  • GVRP VLAN Registration Protocol — allows automatic learning and dynamic assignment of VLANs

Layer 3 services

  • Loopback interface address — defines an address in Routing Information Protocol (RIP) and OSPF that can always be reachable, improving diagnostic capability
  • User Datagram Protocol (UDP) helper function — allows UDP broadcasts to be directed across router interfaces to specific IP unicast or subnet broadcast addresses and prevents server spoofing for UDP services such as DHCP
  • Route maps — provide more control during route redistribution; allow filtering and altering of route metrics
  • Dynamic Host Configuration Protocol (DHCP) — simplifies the management of large IP networks and supports client and server; DHCP Relay enables DHCP operation across subnets

Layer 3 routing

  • IPv6 tunneling — is an important element for the transition from IPv4 to IPv6; allows IPv6 packets to traverse IPv4-only networks by encapsulating the IPv6 packet into a standard IPv4 packet; supports manually configured, 6to4, and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) tunnels
  • Bidirectional Forwarding Detection (BFD) — enables link connectivity monitoring and reduces network convergence time for RIP, OSPF, BGP, IS-IS, VRRP, and IRF
  • Policy-based routing — makes routing decisions based on policies set by the network administrator
  • IGMPv1, v2, and v3 — allow individual hosts to be registered on a particular VLAN
  • PIM-SSM, PIM-DM, and PIM-SM (for IPv4 and IPv6) — support IP Multicast address management and inhibition of DoS attacks
  • Layer 3 IPv4 routing — provides routing of IPv4 at media speed; supports static routes, RIP and RIPv2, OSPF, IS-IS, and BGP
  • Equal-Cost Multipath (ECMP) — enables multiple equal-cost links in a routing environment to increase link redundancy and scale bandwidth
  • Layer 3 IPv6 routing — provides routing of IPv6 at media speed; supports static routes, RIPng, OSPFv3, IS-ISv6, and MP-BGP

Security

  • Access control lists (ACLs) — provide IP Layer 3 filtering based on source/destination IP address/subnet and source/destination TCP/UDP port number
  • Secure Shell — encrypts all transmitted data for secure remote CLI access over IP networks
  • Port security — allows access only to specified MAC addresses, which can be learned or specified by the administrator
  • Secure FTP — allows secure file transfer to and from the switch; protects against unwanted file downloads or unauthorized copying of a switch configuration file
  • Secure management access — securely encrypts all access methods (CLI, GUI, or MIB) through SSHv2, SSL, and/or SNMPv3
  • Identity-driven security and access control 
    • Per-user ACLs — permits or denies user access to specific network resources based on user identity, location, and time of day, allowing multiple types of users on the same network to access specific network services without risk to network security or unauthorized access to sensitive data
    • Automatic VLAN assignment — automatically assigns users to the appropriate VLAN based on their identity and location, and the time of day
  • STP BPDU port protection — blocks Bridge Protocol Data Units (BPDUs) on ports that do not require BPDUs, preventing forged BPDU attacks
  • DHCP protection — blocks DHCP packets from unauthorized DHCP servers, preventing denial-of-service attacks
  • Dynamic ARP protection — blocks ARP broadcasts from unauthorized hosts, preventing eavesdropping or theft of network data
  • STP Root Guard — protects the root bridge from malicious attacks or configuration mistakes
  • Guest VLAN — similar to IEEE 802.1X, it provides a browser-based environment to authenticated clients
  • MAC-based authentication — allows or denies access to the switch based on a client MAC address
  • IP Source Guard — helps prevent IP spoofing attacks
  • Endpoint Admission Defense (EAD) — provides security policies to users accessing a network
  • RADIUS/HWTACACS — eases switch management security administration by using a password authentication server

Convergence

  • IP multicast snooping (data-driven IGMP) — automatically prevents flooding of IP multicast traffic
  • IEEE 802.1AB Link Layer Discovery Protocol (LLDP) — is an automated device discovery protocol that provides easy mapping of network management applications
  • Internet Group Management Protocol (IGMP) — is used by IP hosts to establish and maintain multicast groups; supports IGMPv1, v2, and v3; utilizes Any-Source Multicast (ASM) or Source-Specific Multicast (SSM) to manage IPv4 multicast networks
  • Protocol Independent Multicast (PIM) — is used for IPv4 and IPv6 multicast applications; supports PIM Dense Mode (PIM-DM), Sparse Mode (PIM-SM), and Source-Specific Mode (PIM-SSM)
  • Multicast Source Discovery Protocol (MSDP) — is used for inter-domain multicast applications, allowing multiple PIM-SM domains to interoperate
  • Multicast Border Gateway Protocol (MBGP) — allows multicast traffic to be forwarded across BGP networks and kept separate from unicast traffic
  • Multicast VLAN — allows multiple VLANs to receive the same IPv4 or IPv6 multicast traffic, reducing network bandwidth demand by eliminating multiple streams to each VLAN
  • LLDP-MED — is a standard extension that automatically configures network devices, including LLDP-capable IP phones
  • LLDP-CDP compatibility — receives and recognizes CDP packets from Cisco's IP phones for seamless interoperation

Monitor and diagnostics

  • Port mirroring — enables traffic on a port to be simultaneously sent to a network analyzer for monitoring
  • OAM (802.3ah) — detects data link layer problems that occurred in the "last mile"; monitors the status of the link between the two devices
  • CFD (802.1ag) — connectivity fault detection (CFD) provides a Layer 2 link OAM (operations, administration, and maintenance) mechanism used for link connectivity detection and fault locating

Additional information

  • Green initiative support — provides support for RoHS and WEEE regulations
  • Green IT and power — use the latest advances in silicon development, shut off unused ports, and use variable-speed fans to improve energy efficiency
How can we help?




Full Name (*)
Please type your full name.
E-mail (*)
Invalid email address.
Phone
Invalid Input
Additional comments?
Invalid Input
Invalid Input

30-Minute Free Consultation

Due to our numerous partnerships, we can provide unbiased opinions on the best solution for your environment.

Unbeatable Prices

Our partnership levels give us the highest product discounts which we pass on as savings to our customers.

Professional Services

Finish your IT projects on-time and under budget with our nation-wide team of senior level engineers.

24x7 Tech Support

Rest assured knowing that our U.S. based IT support team is here for you on nights, weekends and when you need us most.