All Categories

    3

    Full Gigabit stackable Layer 3 managed switches

    $391.09 $0 View Details
    Model: TL-SG6428 SKU: 10000150522501 Category: 28 port switch,Gigabit switch,Managed Switches Brand: TP-LINK Condition: New Sealed Under Guarantee Size: 440.00 mm, 180.00 mm, 44.00 mm Product Selection Engineer: Huankanheng Order No: TL-SG6428 Shipping:

    Leading
    Warehouse

    TP-LINK's newly developed full-gigabit stacked Layer 3 network management switch adopts a new generation of high-performance hardware and software platform, provides flexible and cost-effective full-gigabit access and uplink ports, supports Layer 3 routing protocol, complete security protection mechanism, perfect ACL/QoS policy and rich VLAN functions, is easy to manage and maintain, and meets users' needs for easy management, high security and low cost networking of network equipment. Core a variety of application scenarios.

    • 24 x 10/100/1000Base-T RJ45 ports
    • 4 independent Gigabit SFP ports
    • It supports TP-LINK commercial cloud platform management
    • Stacking is supported, up to 8 stacking units
    • OSPF/RIP dynamic routing, static routing, and ARP proxy are supported
    • DHCP server, DHCP relay, and DHCP snooping are supported
    • Supports quaternary binding, ARP/IP/DoS protection, and 802.1X authentication
    • VLANs, QoS, ACLs, spanning trees, multicast, and IPv6 are supported
    • Web management, CLI command line, and SNMP are supported

    Full Gigabit ports

    • It supports the combination of "Ethernet port + optical port", which is convenient for users to flexibly network and meet the networking needs of various scenarios.
    • All ports have gigabit wire-speed forwarding capability to meet the needs of different users.

    Strong business processing capabilities

    • OSPFv2, OSPFv3, RIP, and RIPng dynamic routing protocols are supported, and routing tables are dynamically generated and updated to solve routing problems after small and medium-sized networks are divided into subnets.
    • IPV4 and IPV6 static routes are supported, and the administrator manually configures route entries to achieve simple, efficient, and reliable communication between different network segments.
    • DHCP servers are supported, which assign IP addresses to hosts in the network.
    • DHCP trunking is supported, and switches in different interfaces or subnets can also obtain IP addresses, reducing the number of DHCP servers.
    • Proxy ARP is supported, so that hosts in different physical networks on the same network segment can communicate normally.
    • IEEE 802.1Q VLAN, MAC VLAN, protocol VLAN, and private VLAN are supported, allowing users to flexibly divide VLANs according to different requirements.
    • GVRP is supported to implement dynamic distribution, registration, and attribute propagation of VLANs, reducing the amount of manual configuration and ensuring the correctness of configuration.
    • The VLAN VPN function encapsulates the outer VLAN tag for the user's private network packets at the public network access end, so that the packets carry two layers of VLAN tags across the public network.
    • It supports QoS, three priority modes based on port, 802.1P-based and DSCP-based, and four queue scheduling algorithms of Equ, SP, WRR, and SP+WRR.
    • ACLs are supported to filter packets by configuring matching rules, processing operations, and time permissions, providing flexible security access control policies.
    • It supports IGMP V1/V2 multicast protocols, MLD snooping, and IGMP snooping to meet the requirements of multi-terminal HD video surveillance and video conferencing access.
    • IPv6 is supported to meet the requirements of network transition from IPv4 to IPv6.

    Complete security protection mechanism

    • Supports IP address, MAC address, VLAN, and port quaternary binding to filter data packets.
    • Supports ARP protection against ARP spoofing and ARP flood attacks, such as gateway spoofing and man-in-the-middle attacks, which are common in LANs.
    • IP source protection is supported to prevent illegal address spoofing, including MAC address spoofing, IP spoofing, and MAC/IP spoofing.
    • DoS protection is supported, and attacks such as Land Attack, Scan SYNFIN, Xmascan, and Ping Flooding are supported.
    • It supports 802.1X authentication, provides authentication functions for LAN computers, and controls the authorization status of controlled ports according to the authentication results.
    • Port security is supported, which stops learning when the number of MAC addresses learned on a port reaches the maximum number to prevent MAC address attacks and control port network traffic.
    • Support DHCP Snooping, effectively eliminate private DHCP servers, and ensure the legitimacy of DHCP servers.

    Versatile reliability protection

    • Supports STP/RSTP/MSTP SPANNING TREE protocol to eliminate Layer 2 loops and implement link backup.
    • Spanning tree security functions are supported to prevent devices in a spanning tree network from various forms of malicious attacks.
    • Static aggregation and dynamic aggregation are supported, effectively increasing link bandwidth, implementing load balancing, link backup, and improving link reliability.

    Easy operation and maintenance

    • It supports TP-LINK commercial cloud platform management and easily realizes remote O&M.
    • Supports multiple management and maintenance methods, such as web management, CLI command line (console, Telnet), and SNMP (V1/V2/V3).
    • Supports HTTPS, SSL V3, TLSV1, SSHV1/V2 and other encryption methods for safer management.
    • RMON, system logs, and port traffic statistics are supported, which is convenient for network optimization and transformation.
    • Supports cable detection, ping detection, and Tracert detection operations to easily analyze faulty network nodes.
    • It supports LLDP, which is convenient for the network management system to query and judge the communication status of the link.
    • CPU monitoring, memory monitoring, ping detection, Tracert detection, and cable detection are supported.

    Hardware specifications

    Port
    • 24 ports of 10/100/1000Mbps
    • 4 independent Gigabit SFPs
    • 1 console port
    Power consumption
    • 18W
    MAC address depth
    • 16K
    Size
    • 440mm×180mm×44mm
    Working environment
    • Operating temperature: 0°C~40°C
    • Operating humidity: 10%~90% (non-condensing)

    Software Specifications

    Routing
    • OSPF and RIP dynamic routing are supported
    • Static routes are supported
    • ARP proxies are supported
    Safety features
    • IP-MAC-Port-VID quaternary binding
    • IP source protection, DoS protection, and port security
    • 802.1X authentication, guest VLAN
    Access control
    • Supports L2~L4 packet filtering based on time period
    • Flow-based rate limiting, destination port redirection, and QoS remarking are supported
    • Policies can be delivered based on ports and VLANs
    VLAN
    • 802.1Q VLAN、MAC VLAN、Private VLAN、Protocol Based VLAN、Voice VLAN
    • VLAN VPN
    • GARP/GVRP
    Address table
    • MAC address display/query, MAC address filtering
    • Static MAC address setting and dynamic MAC address management
    • Support for IVL
    Port management
    • Port aggregation, port monitoring, and port rate limiting
    • Storm suppression
    Spanning trees
    • STP (802.1d)、RSTP (802.1w)、MSTP (802.1s)
    • Spanning tree security
    Multicast management
    • IGMP V1/V2/V3
    • Multicast address management, multicast VLANs, multicast routing ports, and static multicast addresses
    • Unknown Multicast Drop, Multicast Filtering, Fast Leave
    QoS
    • 8 port queues
    • Supports port-based, 802.1P, and DSCP/ToS prioritization
    • It supports four priority scheduling modes: Equ, SP, WRR, and SP+WRR
    DHCP
    • DHCP Server and DHCP Relay
    • DHCP Snooping, DHCP Attack Protection, Option82
    System maintenance
    • Supports configuring import and export and system time settings
    • Loopback detection, cable detection, ping, and tracert detection
    • Display/filter system logs, log servers
    System administration
    • Web management based on HTTP, SSL (v2/v3/TLSv1), and CLI management based on Telnet, Console, and SSH (v1/v2) are supported
    • SNMP V1/V2/V3 (TP-LINK MIBs), GB cluster management
    • Free software upgrades
    Security management
    • Supports security management based on ports, MAC addresses, and IP addresses
    TP-LINK's newly developed full-gigabit stacked Layer 3 network management switch adopts a new generation of high-performance hardware and software platform, provides flexible and cost-effective full-gigabit access and uplink ports, supports Layer 3 routing protocol, complete security protection mechanism, perfect ACL/QoS policy and rich VLAN functions, is easy to manage and maintain, and meets users' needs for easy management, high security and low cost networking of network equipment. Core a variety of application scenarios.

    24 x 10/100/1000Base-T RJ45 ports
    4 independent Gigabit SFP ports
    It supports TP-LINK commercial cloud platform management
    Stacking is supported, up to 8 stacking units
    OSPF/RIP dynamic routing, static routing, and ARP proxy are supported
    DHCP server, DHCP relay, and DHCP snooping are supported
    Supports quaternary binding, ARP/IP/DoS protection, and 802.1X authentication
    VLANs, QoS, ACLs, spanning trees, multicast, and IPv6 are supported
    Web management, CLI command line, and SNMP are supported

    Full Gigabit ports

    It supports the combination of "Ethernet port + optical port", which is convenient for users to flexibly network and meet the networking needs of various scenarios.
    All ports have gigabit wire-speed forwarding capability to meet the needs of different users.

    Strong business processing capabilities

    OSPFv2, OSPFv3, RIP, and RIPng dynamic routing protocols are supported, and routing tables are dynamically generated and updated to solve routing problems after small and medium-sized networks are divided into subnets.
    IPV4 and IPV6 static routes are supported, and the administrator manually configures route entries to achieve simple, efficient, and reliable communication between different network segments.
    DHCP servers are supported, which assign IP addresses to hosts in the network.
    DHCP trunking is supported, and switches in different interfaces or subnets can also obtain IP addresses, reducing the number of DHCP servers.
    Proxy ARP is supported, so that hosts in different physical networks on the same network segment can communicate normally.
    IEEE 802.1Q VLAN, MAC VLAN, protocol VLAN, and private VLAN are supported, allowing users to flexibly divide VLANs according to different requirements.
    GVRP is supported to implement dynamic distribution, registration, and attribute propagation of VLANs, reducing the amount of manual configuration and ensuring the correctness of configuration.
    The VLAN VPN function encapsulates the outer VLAN tag for the user's private network packets at the public network access end, so that the packets carry two layers of VLAN tags across the public network.
    It supports QoS, three priority modes based on port, 802.1P-based and DSCP-based, and four queue scheduling algorithms of Equ, SP, WRR, and SP+WRR.
    ACLs are supported to filter packets by configuring matching rules, processing operations, and time permissions, providing flexible security access control policies.
    It supports IGMP V1/V2 multicast protocols, MLD snooping, and IGMP snooping to meet the requirements of multi-terminal HD video surveillance and video conferencing access.
    IPv6 is supported to meet the requirements of network transition from IPv4 to IPv6.

    Complete security protection mechanism

    Supports IP address, MAC address, VLAN, and port quaternary binding to filter data packets.
    Supports ARP protection against ARP spoofing and ARP flood attacks, such as gateway spoofing and man-in-the-middle attacks, which are common in LANs.
    IP source protection is supported to prevent illegal address spoofing, including MAC address spoofing, IP spoofing, and MAC/IP spoofing.
    DoS protection is supported, and attacks such as Land Attack, Scan SYNFIN, Xmascan, and Ping Flooding are supported.
    It supports 802.1X authentication, provides authentication functions for LAN computers, and controls the authorization status of controlled ports according to the authentication results.
    Port security is supported, which stops learning when the number of MAC addresses learned on a port reaches the maximum number to prevent MAC address attacks and control port network traffic.
    Support DHCP Snooping, effectively eliminate private DHCP servers, and ensure the legitimacy of DHCP servers.

    Versatile reliability protection

    Supports STP/RSTP/MSTP SPANNING TREE protocol to eliminate Layer 2 loops and implement link backup.
    Spanning tree security functions are supported to prevent devices in a spanning tree network from various forms of malicious attacks.
    Static aggregation and dynamic aggregation are supported, effectively increasing link bandwidth, implementing load balancing, link backup, and improving link reliability.

    Easy operation and maintenance

    It supports TP-LINK commercial cloud platform management and easily realizes remote O&M.
    Supports multiple management and maintenance methods, such as web management, CLI command line (console, Telnet), and SNMP (V1/V2/V3).
    Supports HTTPS, SSL V3, TLSV1, SSHV1/V2 and other encryption methods for safer management.
    RMON, system logs, and port traffic statistics are supported, which is convenient for network optimization and transformation.
    Supports cable detection, ping detection, and Tracert detection operations to easily analyze faulty network nodes.
    It supports LLDP, which is convenient for the network management system to query and judge the communication status of the link.
    CPU monitoring, memory monitoring, ping detection, Tracert detection, and cable detection are supported.

    1 review for Donec eu furniture

    admin - September 12, 2018

    roadthemes

    Add a review

    Your email address will not be published. Required fields are marked

    Your rating

    0.299011s