- HARDDISK DRIVES
- PROCESSOR INTEL
- ESVA JBOD Series
- Cluster File System
- ESVA iSCSI-host Series
- FC-host Series
- EonStor DS JBOD Series
- EonStor DS SAS-host Series
- EonStor DS iSCSI-host Series
- EonStor DS FC-host Series
- EonStor DS 1000 series
- EonStor DS 3000 Series
- EonStor JBOD Series
- EonStor SAS-host Series
- EonStor SAS-host Series
- EonStor iSCSI-host Series
- FC-Host Series
- EonNAS Pro Series
- EonNAS 1000 Series
- EonNAS 3000 Series
- EonStor GS 3000 Series
- EonStor GSe 1000 Series
- EonStor GSe 2000 Series
- EonStor GSe 3000 Series
- AS6700-32X with ONIE
- ECS4610 Series
- ECS4510 Series
- ECS4620 Series
- ECS2000 Series
- ECS4110 Series
- ECS4210 Series
- Edge-Core Cirro Cloud System
- ECView Pro
- Fusion™ Dish .6m
- Fusion™ Sector
- SunSpot™ AC
- SkyFire™ AC
- SG 210, SG 230x, SG 310, SG 330, SG 430, SG 450, SG 550, SG 650
- Sophos RED
Notice: Undefined offset: 2 in /home/mkl/public_html/cms/function/application.php on line 317
Notice: Undefined variable: query in /home/mkl/public_html/src/App/Menu.php on line 41
Notice: Undefined offset: 0 in /home/mkl/public_html/cms/function/application.php on line 318
- Networking & Security
Sophos SG Series Appliances
- Networking Security
- Access Wired Networks Switch
-  /  Ecs3510 52t
Notice: Undefined index: HTTPS in /home/mkl/public_html/cms/function/application.php on line 4
It’s a great entry level managed with 17.6Gbps switching capacity delivers wire-speed switching performance to take full advantage of existing high-performance on PCs and laptops by significantly improving the responsiveness of applications and file transfer times .
The device also has four Gigabit Ethernet combo ports for uplink flexibility, allowing copper or fiber uplinks to servers or the network backbone.
The ECS3510-52T supports G.8032 Ethernet Ring Protection Switching, with the ability for the network to detected and recover from incidents without impacting users, meeting the most demanding quality and availability requirements. Rapid recovery time when problems do occur is as low as 50 msec.
IEEE 802.1w Rapid Spanning Tree Protocol provides a loop-free network and redundant links to the core network with rapid convergence, to ensure faster recovery from failed links, enhancing overall network stability and reliability.
IEEE 802.1s Multiple Spanning Tree Protocol runs STP per VLAN base, providing Layer 2 load sharing on redundant links .
Multicast VLAN Registration (MVR) is designed for applications such as Media-on-Demand is using multicast traffic across an Ethernet network.
IGMP snooping prevents flooding of IP multicast traffic and limits bandwidth intensive video traffic to only the subscribers.
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone.
The IEEE 802.1Q-in-Q VLAN Tag is purpose to expand the VLAN space by tagging the tagged packets.
Traffic is prioritized according to 802.1p, DSCP, IP precedence and TCP/UDP port number, giving optimal performance to real-time applications such as voice and video.
Asymmetric bidirectional rate-limiting, per port or per traffic class, preserves network bandwidth and allowing maximum control of network resources.
Port Security ensures access to switch ports based on MAC address, limits the total number of devices from using a switch port and protects against MAC flooding attacks.
IEEE 802.1x port-based or MAC-based access control ensures all users are authorized before being granted access to the network. User authentication is carried out using any standard-based dynamic VLAN assignment with RADIUS server by guest VLAN.
Access Control Lists (ACLs) can be used to restrict access to sensitive network resources by denying packets based on source and destination MAC addresses, IP addresses, TCP/UDP ports. This is done by hardware, so switching performance is not compromised.
Security Shell (SSHv1.5/v2.0) and Secure Sockets Layer (SSL/HTTPS) encrypt network management information via Telnet and web, providing secure network management.
TACACS+ Authentication for applications such as network access or IP mobility enables centralized control of the switch and restricts unauthorized users from altering the configuration of the switch.
Private VLAN isolates edge ports to ensure user privacy.
Industry standard Command Line Interface (CLI) via console port or Telnet provides a common user interface and command set for users to manipulate the switch.
IP Source Guard is enabled on a trunk port with a large number of VLANs that have DHCP snooping enabled, you might run out of ACL
DHCP snooping provides security by filtering un-trusted DHCP messages and by building and maintaining a DHCP snooping binding table
DHCP Option 82 is feature has a device add information to client TCP/IP configuration requests that it relays to a DHCP server.
DOWNLOAD DATASHEET CLICK HEREECS3510-52T
The Edge-Core ECS3510-52T is a high-performance Fast Ethernet Layer 2/4 switch featuring 52 ports; 48 10/100Base-TX ports and 4 combo Gigabit Ethernet RJ-45/SFP (Small Form Factor Pluggable ) ports. It is ideal for desktop Fast Ethernet connectivity and wiring closet installations. This switch is packed with features and is a cost-effective solution that brings continuous availability, enhanced security and advanced QoS to the network edge, while maintaining simplicity of management.
ECS3510-52T - L2 Fast Ethernet Standalone Switch
Data Center Switch
Core Networks Switch
Distribution Networks Switch
Access Wired Networks Switch
Access Wireless Networks
Accesories and Cables
Network SoftwareSERVERDue to the complexity of integration, this product is sold as completely assembled...STORAGEDesigned to empower SMB users by leveraging existing investment in IP networks to implement high...NETWORKING & SECURITYECS3810-26T - L2 Fast Ethernet Carrier Grade SwitchWIRELESSSunSpot™ AC - Indoor single and dual-radio enterprise APs
EonStor DS Family
EonStor GS Family
EonStor GSe Family
SuperServer Rackmount 1U
SuperServer Rackmount 2U