The T2600G-28MPS provides 24 10/100/1000Mbps ports that support 802.3at/af-compliant PoE, with a total PoE power supply of up to 384W, giving users the power and flexibility to deploy wireless access points or IP-based network surveillance cameras. In addition, it provides high performance static routing, enterprise-level QoS, advanced security strategies and rich layer 2 management attributes. With all these advanced features, the JetStream Gigabit L2 Managed PoE Switch is an ideal choice for small and medium business networking solutions.
The switch provides high performance, powerful L2 and L2+ features like static routing, enterprise-level QoS and other advanced security strategies. OAM, L2PT and sFlow can meet the requirement of large ISP customers, and the IP-MAC-Port Binding and Access Control List (ACL) functions protect against broadcast storm, ARP and Denial-of-Service (DoS) attacks, etc. Quality of Service (QoS, L2 to L4) provides enhanced traffic management capabilities to move your data smoother and faster. Moreover, the easy-to-use web management interfaces, along with CLI, SNMP, RMON and Dual Image mean faster setup and configuration with less downtime. For workgroup and departments requiring cost-sensitive L2 Switch and gigabit capability, TP-LINK JetStream 24-Port Gigabit L2 managed PoE+ Switch T2600G-28MPS provides you the ideal network solution.
The T2600G-28MPS supports 24 ports of IEEE 802.3at/af-compliant PoE and has a total power supply of 384W to power any 802.3at or 802.3af compliant power device. It's an efficient and cost-effective choice to work with wireless access points, surveillance cameras, IP phones and other PoE supported devices, while getting rid of cables or power lines running around. Compact and flexible, the T2600G-28MPS is ideal to flexibly use PoE to deploy wireless access points or IP-based network surveillance cameras for projects or small business networks.
The T2600G-28MPS provides IP-MAC-Port Binding, Port Security, Storm control and DHCP Snooping which protect against broadcast storms, ARP attacks, etc. It integrates some typical DoS attacks to select. You can protect these attacks more easily ever than before. In addition, the Access Control Lists (ACL, L2 to L4) feature restricts access to sensitive network resources by denying packets based on source and destination MAC address, IP address, TCP/UDP ports and even VLAN ID. Moreover, the switch supports 802.1X authentication, which is used in conjunction with a RADIUS server to require some authentication information before access to the network is allowed. Guest VLAN function supports to enable the non-802.1X clients to access the specific network resource.