- HARDDISK DRIVES
- PROCESSOR INTEL
- ESVA JBOD Series
- Cluster File System
- ESVA iSCSI-host Series
- FC-host Series
- EonStor DS JBOD Series
- EonStor DS SAS-host Series
- EonStor DS iSCSI-host Series
- EonStor DS FC-host Series
- EonStor DS 1000 series
- EonStor DS 3000 Series
- EonStor JBOD Series
- EonStor SAS-host Series
- EonStor SAS-host Series
- EonStor iSCSI-host Series
- FC-Host Series
- EonNAS Pro Series
- EonNAS 1000 Series
- EonNAS 3000 Series
- EonStor GS 3000 Series
- EonStor GSe 1000 Series
- EonStor GSe 2000 Series
- EonStor GSe 3000 Series
- AS6700-32X with ONIE
- ECS4610 Series
- ECS4510 Series
- ECS4620 Series
- ECS2000 Series
- ECS4110 Series
- ECS4210 Series
- Edge-Core Cirro Cloud System
- ECView Pro
- Fusion™ Dish .6m
- Fusion™ Sector
- SunSpot™ AC
- SkyFire™ AC
- SG 210, SG 230x, SG 310, SG 330, SG 430, SG 450, SG 550, SG 650
- Sophos RED
Notice: Undefined offset: 2 in /home/mkl/public_html/cms/function/application.php on line 317
Notice: Undefined variable: query in /home/mkl/public_html/src/App/Menu.php on line 41
Notice: Undefined offset: 0 in /home/mkl/public_html/cms/function/application.php on line 318
- Networking & Security
Sophos SG Series Appliances
- Networking Security
- Access Wired Networks Switch
-  /  Ecs3510 28t 1
Notice: Undefined index: HTTPS in /home/mkl/public_html/cms/function/application.php on line 4
Performance and Scalability
With 12.8 Gbps switching capacity, the ECS3510-28T delivers wire-speed switching performance on all Gigabit ports, allowing users to take full advantage of existing high-performance, Gigabit integrated servers, PCs and laptops by significantly improving the responsiveness of applications and file transfer times.
The device also has four Gigabit Ethernet combination ports for uplink flexibility, allowing copper or fiber uplinks to servers or the network backbone.
IEEE 802.1w Rapid Spanning Tree Protocol provides a loop-free network and redundant links to the core network with rapid convergence, to ensure faster recovery from failed links, enhancing overall network stability and reliability.
IEEE 802.1s Multiple Spanning Tree Protocol runs STP per VLAN base, providing Layer 2 load sharing on redundant links.
Multicast VLAN Registration (MVR) is designed for applications such as Media-on-Demand that sends multicast traffic across an Ethernet network.
IGMP snooping prevents flooding of IP multicast traffic and limits bandwidth-intensive video traffic to only the subscribers.
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone.
Support for IEEE 802.1Q-in-Q VLAN tags expands the VLAN space by double tagging packets.
Traffic is prioritized according to 802.1p, DSCP, IP precedence and TCP/UDP port number, giving optimal performance to real-time applications such as voice and video.
Asymmetric bidirectional rate-limiting, per port or per traffic class, preserves network bandwidth and allows maximum control of network resources.
Port Security ensures access to switch ports based on MAC address, limits the total number of devices from using a switch port, and protects against MAC flooding attacks.
IEEE 802.1X port-based or MAC-based access control ensures all users are authorized before being granted access to the network. User authentication is carried out using any standard-based RADIUS server, with support for dynamic VLAN assignment and a guest VLAN.
Access Control Lists (ACLs) can be used to restrict access to sensitive network resources by denying packets based on source and destination MAC addresses, IP addresses, or TCP/UDP ports. ACLs are hardware supported, so switching performance is not compromised.
Secure Shell (SSH) and Secure Sockets Layer (SSL/HTTPS) encrypts Telnet and web access to the switch, providing secure network management.
TACACS+ 3.0 authentication for applications, such as network access or IP mobility, enables centralized control of the switch and prevents unauthorized users from altering the switch configuration.
Private VLANs isolate edge ports to ensure user privacy.
An industry-standard command-line interface (CLI), accessed through the console port or Telnet, provides a convenient way to configure and troubleshoot the switch.
DHCP snooping provides security by filtering un-trusted DHCP messages and by building and maintaining a DHCP snooping binding table.
If you run out of ACLs, IP Source Guard can be enabled on a trunk port with a large number of VLANs that have DHCP snooping enabled.
DHCP Option 82 is a feature that adds device information to client TCP/IP configuration requests, which are relayed to a DHCP server.
DOWNLOAD DATASHEET CLICK HEREECS3510-28T
The Edge-Core ECS3510-28T is a high-performance Fast Ethernet Layer 2/4 switch featuring 28 ports; 24 10/100BASE-TX ports and four combination Gigabit Ethernet RJ-45/SFP (Small Form Factor Pluggable) ports. It is ideal for desktop Fast Ethernet connectivity and wiring closet installations. This switch is packed with features and is a cost-effective solution that brings continuous availability, enhanced security and advanced QoS to the network edge, while maintaining simplicity of management.
ECS3510-28T - L2 Fast Ethernet Standalone Switch
Data Center Switch
Core Networks Switch
Distribution Networks Switch
Access Wired Networks Switch
Access Wireless Networks
Accesories and Cables
Network SoftwareSERVERSupermicroSTORAGEEnterprise-class performance, data protection, and services and SMB-friendly price points for easy...NETWORKING & SECURITYECS4510-28P - L2+ Gigabit Ethernet Stackable SwitchWIRELESSSunSpot™ AC - Indoor single and dual-radio enterprise APs
EonStor DS Family
EonStor GS Family
EonStor GSe Family
SuperServer Rackmount 1U
SuperServer Rackmount 2U