Brand:TP Link

TP-Link TL-SG3452 T2600G-52TS JetStream 48-Port Gigabit L2+ Managed Switch with 4 SFP Slots Static Routing L2/L3/L4 QoS IGMP snooping IP-MAC LS

729.00 729.00 729.0 AUD

729.00

Last In Stock
Add to Cart

NWTL-SG3452


TP-LINK JetStream 48-Port Gigabit L2 Managed Switch with 4 SFP Slots T2600G-52TS (TL-SG3452)

Gigabit Ethernet connections on all ports provide full speed of data transferring
L2+ feature——Static Routing, helps route internal traffic for more efficient use of network resources
IP-MAC-Port Binding, ACL, Port Security, DoS Defend, Storm control, DHCP Snooping, 802.1X Authentication and Radius provide you robust security strategies
L2/L3/L4 QoS and IGMP snooping optimize voice and video application
IPv6 support with dual IPv4/IPv6 stack, MLD snooping, IPv6 neighbor discovery
Web, CLI (Console Port, Telnet, SSH), SNMP, RMON and Dual Image bring abundant management policies.

What This Product Does

TP-LINK JetStream Gigabit L2 managed switch T2600G-52TS provides 48 10/100/1000Mbps ports and 4 Gigabit SFP Slots. The switch provides high performance, powerful L2 and L2+ features like static routing, enterprise-level QoS and other advanced security strategies. The IP-MAC-Port Binding and Access Control List (ACL) functions protect against broadcast storm, ARP and Denial-of-Service (DoS) attacks, etc. Quality of Service (QoS, L2 to L4) provides enhanced traffic management capabilities to move your data smoother and faster. Moreover, the easy-to-use web management interfaces, along with CLI, SNMP, RMON and Dual Image mean faster setup and configuration with less downtime. For workgroup and departments requiring cost-sensitive L2 Switch and gigabit capability, TP-LINK JetStream 48-Port Gigabit L2 managed Switch T2600G-52TS provides you the ideal network solution.

Secure Networking

TP-LINK JetStream L2 managed switch T2600G-52TS provides IP-MAC-Port Binding, Port Security, Storm control and DHCP Snooping which protect against broadcast storms, ARP attacks, etc. It integrates some typical DoS attacks to select. You can protect these attacks more easily ever than before. In addition, the Access Control Lists (ACL, L2 to L4) feature restricts access to sensitive