Here you will find network switch components of all known manufacturers (for example: Cisco, Hewlett Packard Enterprise, 3com, Allied Telesis, D-Link, Nortel)
. Can compare prices and technical specifications (Switching mechanism, Cross-switching possibility, Performance management, Heat dissipation, Size, Cabling technology).
24 Ports 10/100Mbps Management Switch + 2 SFP Gigabit Dual Media Ports
-Supports QoS with 4 Priority Queues and Port Mirroring -Supports Port-Based and Tag-Based VLAN -Mac-Based 802.ad Lacp with Automatic Link Fail-Over -Supports 802.1x Access Control to Improve Network Security -Supports 802.1D Compatible & 802.1w Rapid Spanning Tree -Provides 2 x SFP Gigabit module slots
Key Features
QoSwith Four Priority Queues The QoS(Quality Of Service) feature provides four internal queues to support four different classifications of traffic. High priority packet streams experience less delay inside the switch,which supports lower latency for certain delay-sensitive traffic. it can classify the packet as one of the four priorities according to 802.1p priority tag, DiffServand/or IP TOS. The QoSoperate at full wire speed. The actual scheduling at each egress port can be based upon a strict priority, weighted round robin or a mix of both.
Port Mirroring This mechanism helps track network errors or abnormal packet transmission without interrupting the flow of data. Allow ingress traffic to be monitored by a single port that is definedas mirror capture port. The mirror capture port can be any 10/100 port, 10/100/1000 port. Mirroring multiple ports is possible but can create congestion at the mirror capture port.
Q-in-Q VLAN for performance & security The VLAN feature in the switch offers the benefits of both security and performance. VLAN is used to isolate traffic between different users and thus provides better security. Limiting the broadcast traffic to within the same VLAN broadcast domain also enhances performance. VLAN support enabling advanced techniques such as "802.1Q-in-1Q" to be deployed.
Isolated Group, Provide Secure for Certain Ports The isolated group feature allows certain ports to be designatedas protected. All other ports are non-isolated. Traffic between isolated group members are blocked. Traffic can only be sent from isolated group to non-isolated group.
Mac-based 802.ad Lacpwith Automatic Link Fail-over Dynamic fail-over means packets will not get assigned to any trunk member port that has failed. If one of the ports were to fail, traffic will automatically get distributed to the remaining active ports.
802.1x Access Control Improve Network Security 802.1x features enable user authentication for each network access attempt. Port security features allow you to limit the number of MAC addresses per port in order to control the number of stations for each port. Static MAC addresses can be defined for each port to ensure only registered machines are allowed to access. By enabling both of these features, you can establish an access mechanism based on user and machine identities, as well as control the number of access stations.
802.1D Compatible & 802.1w Rapid Spanning Tree For mission critical environments with multiple switches supporting STP, you can configure the switches with a redundant backup bridge path, so transmission and reception of packets canbe guaranteed in event of any fail-over switch on the network.
2 Dual Media for Flexible Fiber Connection 25, 26 dual media port are provided for flexible fiber connection. You can select to install optional transceiver modules in these slots for short, medium or long distance fiber backbone attachment. Use of the SFP will disable their corresponding built-in 10/100/1000Base-T connections.
Broadcast/Multicast/unknown-unicast Storm Control To limit too many broadcast/multicast/unknown-unicast flooding in the network, broadcast/multicast storm control is used to restrict excess traffic. Threshold values are available to control the rate limit for each port. Packets are discarded if the count exceeds the configured upper threshold.
Subscriber Interface 1-24 10/100Mbps Fast Ethernet ports. / 25,26 are Gigabit TP/ SFP Fiber auto sense Auto-Negotiation and Auto-MDIX Backpressure flow control for half duplex / 802.3x flow control for full duplex. Connector: 24 RJ-45 and 25,26 dual media (RJ-45/SFP)
Switching capacity: Non-blocking switch fabric supports up to 24FE+2GbE, ports 8K MAC addresses / 256k packet buffer and 128k control memory
VSM (Virtual Stacking Management) Supports 16 switches can be Stack / managed via one IP address, just like software stacking Low cost and easily to establish network environment, not extra hardware require. Not center on the physical location of writing closets
Bandwidth Control Ingress rate limit :Port 1~24: 1K up to 100Mbps / Port 25, 26: 1K up to 1000Mbps Egress rate limit : Port 1~24: 1K up to 100Mbps / Port 25, 26: 1K up to 1000Mbps
Port Mirroring Support 1: N RX port miroingrr Supports port sniffer function with 3 modes: (TX Monitor, RX Monitor and TX-RX pair Monitor Mode)
Restricted Group Can decide the direction of transmitting packets for the specific port
Protocol LACP : 2 Fast Ethernet +1 Gigabit Ethernet groups, per-group max 4 member Mac-based Trunkingwith automatic link fail-over
GVRP/GARP : 802.1q with GVRP/ GARP
Multicasting : Supports IGMP snooping including active and passive mode STP/RSTP : 802.1d/1w
Network Security 802.1x access control / Isolated group / Restricted group / Management Access Policy Control / Static mac, to limit which mac addresses can pass through or not / Mac addresses learning limit, to set up the maximum amount of mac that each port can learn
SNMPv1, v2c Network Management MIB Files: Interface MIB, Address Translation MIB, Statistics Group 1, History Group 2, Alarm Group 3, Event Group 9, IP MIB, ICMP MIB, TCP MIB, UDP MIB, SNMPMIB, FC 1213 MIB (MIB-II), RFC 1757 RMON MIB, RFC 1493 Bridge MIB, RFC 1643 Ethernet MIB, Enterprise MIB
By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.