RSS Feed

การนำทางบล็อก

โพสต์ล่าสุด

Review VIGI Cloud VMS บริหารจัดการระบบ VIGI CCTV Multi-Site ผ่าน Cloud
Review VIGI Cloud VMS บริหารจัดการระบบ VIGI CCTV Multi-Site ผ่าน Cloud
132 มุมมอง 0 ชอบ

Review VIGI Cloud VMS บริหารจัดการระบบ VIGI CCTV Multi-Site ผ่าน Cloud ฟรีไม่มีค่าใช้จ่าย และ ไม่จำกัด Site

อ่านเพิ่มเติม
EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port
  • EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port
  • EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port
  • EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port
  • EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port
  • EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port
  • EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port

EWS2910P-FIT Engenius FITSwitch Managed Gigabit 8-Port 55W PoE Switch 2 SFP Port

EnGenius

EWS2910P-FIT 

Engenius EWS2910P-FIT FITSwitch Managed Gigabit POE Switch 8-Port, 2 SFP Port, จ่ายไฟ POE 8 Port มาตรฐาน 802.3af สูงสุด 55W รองรับการ Managed ผ่าน Controller

฿5,590.00
ยังไม่ได้รวมภาษี
จำนวน
3 รายการ

Rating:
(0)


สอบถามรายละเอียดสินค้าเพิ่มเติม LINE: @sysnet

Click ขอใบเสนอราคา

close

แบบฟอร์มขอใบเสนอราคา

 

รายละเอียด

EnGenius Fit EWS2910P-FIT Managed Switch Datasheet
EnGenius Fit Management Datasheet

Review Engenius Fit โซลูชั่น Access Points และ Switches 

Engenius EWS2910P-FIT

FIT-Switch Managed Gigabit POE Switch 8-Port, 2 SFP Port, จ่ายไฟ 8 Port มาตรฐาน 802.3af รวมสูงสุด 55W รองรับการ Managed ผ่าน Controller

EWS2910P-FIT Product Highlight

  • 8 x Gigabit PoE Ports and 2 x SFP uplink ports
  • Zero touch provisioning centralized cloud management, and visualized monitoring
  • Hybrid cloud switch supports flexible management options such as EnGenius FIT cloud, FITCON on-premises, or standalone
  • Robust security that supports Port-based / MAC-based ACL Storm control, DHCP Snooping, DOS Attack Prevention, 802.1X & RADIUS Authentication, and more
  • Optimized for quality voice and video traffic with Voice-VLAN featureDesktop Model Supports 802.3af PoE With a Total Budget of 55W

EWS2910P-FIT Technical Specifications

Port Standards 802.3 10Base-T Ethernet
802.3u 100Base-TX Ethernet
802.3ab 1000Base-T Ethernet
802.3x Full-Duplex Flow Control
Network Port – Gigabit Ethernet Ports

8×10/100/1000 Mbps Ports

Switching Capacity

16Gbps

SDRAM

256MB

Flash Memory

32MB

PoE Capable Ports

Ports 1-8

Total PoE Budget

55W

Power Source

100 to 240 VAC, 50/60Hz

Physical Interface

LED Indicators Power LED
Fault LED
PoE Max LED
LAN Mode LED
PoE Mode LED
Ports Link/Activity/Speed (per Ethernet port)
Link/Activity/Speed (per SFP slot)

EWS2910P-FIT Wireless Management Features

Deployment Options Stand-Alone (Individually Managed)
FitXpress
FitController

Environmental & Physical

Temperature Range

Operating: 32°F to 104°F (0°C to 40°C)

Humidity (Non-Condensing)

Operating: 5% – 95%

Dimensions & Weight

Device Dimensions & Weights Weight: 1.36 lbs. (620 g)
Length: 9.44” (240 mm)
Width: 4.13” (105 mm)
Height: 1.06” (27 mm)
Package Contents 1x FIT Managed Switch
1x Quick Installation Guide
1x Power Adapter
1x Power Cord
1x Wall Mount Kit
1x Ground Screw Set

EWS2910P-FIT Software Lists of Layer 2-Plus Managed Switches

Layer 2 Features

DHCP Snooping
DHCP snooping is a layer 2 security technology built into the operating system of a capable network switch that drops DHCP traffic determined to be unacceptable. The fundamental use case for DHCP snooping is to prevent unauthorized (rogue) DHCP servers offering IP addresses to DHCP clients.

DHCP Relay
A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay agents are used to forward requests and replies between clients and servers when they are not on the same physical subnet.

DHCP Option 82
DHCP option 82 provides additional security when DHCP is used to allocate network addresses. It enables the switch to act as a DHCP relay agent to prevent DHCP client requests from untrusted sources.

PoE (Power over Ethernet)
Power over Ethernet (POE) is a technology that lets network cables carry electrical power. POE switch is a network switch that has Power over Ethernet injection built-in. Simply connect other network devices to the switch as normal, and the switch will detect whether they are POE-compatible and enable power automatically.

EEE (Energy Efficient Ethernet)
Energy Efficient Ethernet (EEE) reduces the power consumption of physical layer devices during periods of low link utilization. EEE saves energy by allowing PHY non-essential circuits shut down when there is no traffic.

Link Aggregation
A Link Aggregation Group (LAG) optimizes port usage by linking a group of ports together to form a single, logical, higher-bandwidth link. Aggregating ports multiplies the bandwidth and increases port flexibility for the Switch.

STP (Spanning Tree Protocol)
The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between Switches.

LBD (Loopback Detection)
Loopback Detection (LBD) is a feature on the switch that provides protection against loops by transmitting loop protocol packets out of ports where loop protection has been enabled. When the switch sends out a loop protocol packet and then receives the same packet, it shuts down the port that received the packet.

Jumbo Frame
Jumbo frames are network-layer PDUs that have 10000 bytes larger enough to carry an 8 KB application datagram plus packet header overhead. It needs to be configured to work on the ingress and egress port of each device along the endto-end transmission path.

MAC Address Table
The MAC address table contains address information that the Switch uses to forward traffic between the inbound and outbound ports. All MAC addresses in the address table are associated with one or more ports.

LLDP (Link Layer Discovery Protocol)
Link Layer Discovery Protocol (LLDP) is essentially a neighbor discovery protocol that uses Ethernet connectivity to advertise information to devices on the same LAN and store information about the network. This information allows the device to quickly identify a variety of other devices, resulting in a LAN that interoperates smoothly and efficiently.

IGMP Snooping
Internet Group Management Protocol (IGMP) Snooping allows a Switch to forward multicast traffic intelligently. A Switch supporting IGMP Snooping can passively snoop on IGMP Query, Report, and Leave packets transferred between IP Multicast switches and IP Multicast hosts to determine the IP Multicast group membership.

MLD Snooping
Multicast Listener Discovery (MLD) Snooping operates on the IPv6 traffic level for discovering multicast listeners on a directly attached port and performs a similar function to IGMP Snooping for IPv4. MLD Snooping limits IPv6 multicast traffic by dynamically configuring the Switch port so that multicast traffic is forwarded only to those ports that wish to receive it. This reduces the flooding of IPv6 multicast packets in the specified VLANs.

Multicast Filtering
Multicast is a form of communication that allows multiple transmissions of multimedia and streaming data to specific recipients at the same time. Multicast Filtering feature lets you sort out selective multiple transmissions for

VLAN Features

802.1Q VLAN
A Virtual LAN (VLAN) is a group of ports that form a logical Ethernet segment on a Layer 2 Switch which provides better administration, security, and management of multicast traffic. A VLAN is a network topology configured according to a logical scheme rather than a physical layout. When you use a VLAN, users can be grouped by logical function instead of physical location.

PVID (Port VLAN ID)
When an untagged packet enters a Switch port, the PVID (Port VLAN ID) will be attached to the untagged packet and forward frames to a VLAN specified VID part of the PVID. A packet received on a given port would be assigned that port’s PVID and then be forwarded to the port that corresponded to the packet’s destination address.

Voice VLAN
Enhance your Voice over IP (VoIP) service by configuring ports to carry IP voice traffic from IP phones on a specific VLAN. Voice VLAN provides QoS to VoIP, ensuring that the quality of the call does not deteriorate if the IP traffic is received erratically or unevenly.

MAC based VLAN*
The MAC-based VLAN feature allows incoming untagged packets to be assigned to a VLAN and thus classify traffic based on the source MAC address of the packet. You define a MAC to VLAN mapping by configuring an entry in the MAC to VLAN table. An entry is specified using a source MAC address and the appropriate VLAN ID. The MAC to VLAN configurations are shared across all ports of the device.

Protocol VLAN*
A protocol-based VLAN processes traffic based on protocol. You can use a protocol-based VLAN to define filtering criteria for untagged packets. The smart switch always processes tagged packets according to the 802.1q standard and does not forward them to protocol-based VLANs. VTP advertisement VLAN Trunk Protocol (VTP) reduces administration in a switched network. Once the VLAN Trunking Protocol (VTP) is configured on the switches, the switches start advertising VLAN Trunking Protocol (VTP) information between them on their trunk ports. This reduces the need to configure the same VLAN everywhere.

Dynamic VLAN assignment
Dynamic VLAN assignment are used by network admins/engineers to place a wireless user into a specific VLAN based on the credentials supplied by the user. This task of assigning users to a specific VLAN is handled by a RADIUS authentication server. Users in an organization are then segmented into these dynamic VLANs based on the resources they can access.

* Available through future firmware upgrade.

Quality of Service

Quality of Service
Quality of Service (QoS) provides the ability to implement priority queuing within a network. In a Switch, multiple queues per port are often provided to give preference to certain packets over others based on user-defined criteria. When a packet is queued for transmission within a port, the rate at which it is processed depends on how the queue is configured and the amount of traffic present within other queues on the port. If a delay is necessary, packets are held in the queue until they are authorized for transmission.

Class of Service (CoS)
Class of service is a parameter used in data and voice protocols to differentiate the types of payloads contained in the packet being transmitted. The objective of such differentiation is generally associated with assigning priorities to the data payload or access levels to the telephone call.

CoS Mapping
Use the Class of Service (CoS) Mapping feature to specify which internal traffic class to map to the corresponding CoS value. CoS allows you to specify which data packets have greater precedence when traffic is buffered due to congestion. Differentiated Services Code Point (DSCP) Differentiated services or DiffServ is a computer networking architecture that specifies a simple and scalable mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks. Use Differentiated Services Code Point (DSCP) Mapping feature to specify which internal traffic class to map to the corresponding DSCP values. DSCP Mapping increases the number of definable priority levels by reallocating bits of an IP packet for prioritization purposes.

Weighted Round-Robin (WRR)
Weighted round robin (WRR) is a network scheduling discipline. Each packet flow or connection has its own packet queue in a network interface controller. In WRR mode the number of packets sent from the queue is proportional to the weight of the queue (the higher the weight the more frames are sent).

Bandwidth Management
Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. Bandwidth is measured in bits per second (bit/s) or bytes per second (B/s).

Security

Radius Server
RADIUS proxy servers are used for centralized administration. Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users that connect and use a network service for greater convenience.

802.1X Authentication Protocol
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

802.1x Port-based Access Control
The IEEE 802.1X port-based authentication provides a security standard for network access control with RADIUS servers and holds a network port disconnected until authentication is completed. With 802.1X port-based authentication, the supplicant provides the required credentials, such as user name, password, or digital certificate to the authenticator, and the authenticator forwards the credentials to the authentication server for verification to the guest VLAN.

MAC-Based Port Security (MAC-based Access Control)
Network security can be increased by limiting access on a specific port to users with specific MAC addresses. Port Security prevents unauthorized device to the Switch prior to stopping auto-learning processing.

Authenticated Host
The Authenticated Host displays the Authenticated User Name, Port, Session Time, Authenticated Method, and Mac Address.

Guest VLAN
A Guest VLAN is a VLAN that allows guests to get in the network. For example, employees and guests can access the wireless network of a company at the same time and be administratively separate.

VLAN Tag
Independent VLAN setting can be enable or disable. Any packet that enters the Device without a VLAN tag will have a VLAN tag inserted with a PVID (Ethernet Port VID).

Radius VLAN Assignment
VLAN assignments build on the use of RADIUS to control access to the network. Via RADIUS integration, a WiFi access point (WAP) requires not only an SSID and passphrase, but a user’s unique set of credentials to access the network. Once a user has passed credentials through to the WAP and they are subsequently passed to the RADIUS server and directory service, the RADIUS server will reply to the WAP that the user has been authenticated and inform what VLAN they are assigned to.

Management VLAN
Feature is enabled with specified VLAN ID, the device will only allow management access with the same specified VLAN ID from remotely location by using protocols such as telnet, SSH, snmp, syslog etc.

Storm Control
Storm Control limits the amount of Broadcast, Unknown Multicast, and Unknown Unicast frames accepted and forwarded by the Switch. Storm Control can be enabled per port by defining the packet type and the rate that the packets are transmitted at.

Port Isolation
Port Isolation feature provides L2 isolation between ports within the same broadcast domain. When enabled, Isolated ports can forward traffic to Not Isolated ports, but not to other Isolated ports. Not Isolated ports can send traffic to any port; whether Isolated or Not Isolated.

DoS Attack Prevention
Denial of Service attack is an attack on the computer or network that restricts, reduce or prevents system restore accessibility to its legitimate users. It is a kind of attack in which an attacker or intruder tries to deprive system users or authorized users of accessing their computers, networks or sites. Enable DoS Attach prevention feature to classifying and blocking specific types of DoS attacks.

Access Control List
An Access Control List (ACL) allows you to define classification rules or establish criteria to provide security to your network by blocking unauthorized users and allowing authorized users to access specific areas or resources. ACLs can provide basic security for access to the network by controlling whether packets are forwarded or blocked at the Switch ports.

Login Authentication Control
Support SSH/Telnet command or HTTP/HTTPS login methods

Management

Account Multi-Privileges Management
Enable this function to control management access to the Switch based on manually configured user names and passwords. A User account can only view settings without the right to configure the Switch, and an Admin account can configure all the functions of the Switch.

HTTPS
A secure communication protocol can be enabled to allow secure management web access over a computer network.

SSH Tunnel
A secure communication protocol can be enabled to allow secure remote shell access or command execution. Command Line Interface (CLI) CLI protocol provides the basic rules for making it possible to link a client to a command interpreter. The Telnet service for the Switch is enabled by default. For secure communication, it is better to use SSH over Telnet.

SNMP & MIB
v1/v2c/v3 support
MIB I/II, Private MIB
CLI supported

Remote Network Monitoring (RMON)
Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to exchange network-monitoring data. RMON provides network administrators with more freedom in selecting network-monitoring probes and consoles with features that meet their particular networking needs.

PoE Management
The PoE Management function support Power on/off per port, Power class configuration, Power feeding priority adjustment feature to monitoring the current power usage and assigns the total amount of power the Switch can provide to all of its PoE ports.

PD LifeGuard
The switch can detect and monitor connected PoE IP cameras or PoE PD (Powered Device) status in real time. Once the PoE PD stops working and responding, switch will recover failed PoE PD device automatically. The PoE lifeguard function with customizable parameters enhance the reliability and suitable for any types of application scenarios.

Port Mirroring
Use port mirroring to send traffic to applications that analyze traffic for purposes such as monitoring compliance, detecting intrusions, monitoring and predicting traffic patterns, and other correlating events.

Syslog
The Syslog protocol allows devices to send event notification messages in response to events, faults, or errors occurring on the platform as well as changes in configuration or other occurrences across an IP network to syslog servers.

Ping
The Packet Internet Groper (Ping) test allows you to verify connectivity to remote hosts. The Ping test operates by sending Internet Control Message Protocol (ICMP) request packets to the tested host and waits for an ICMP response.

Trace Route
The trace route feature is used to discover the routes that packets take when traveling to their destination. It will list all the routers it passes through until it reaches its destination, or fails to reach the destination and is discarded.

Cable Diagnostics
Cable Diagnostics helps you to detect whether your cable has connectivity problems provides information about where errors have occurred in the cable.

Dual Image
The Switch maintains two versions of the Switch image in its permanent storage. One image is the active image, and the second image is the backup image. The Dual Image screen enables the user to select which partition will be set as active after the next reset. The Switch boots and runs from the active image. If the active image is corrupt, the system automatically boots from the non-active image.

Firmware Update
Update switch throughout manually update Update switch throughout one-click-update function

Configuration Backup/Restore
Backup overall setting of the switch. Users can restore this settings/configuration to one switch easily.

Reboot/Reset
Select to reboot or reset your switch under your application platform.

ประกัน

EWS2910P-FIT 5 ปี

 

รายละเอียดสินค้า
3 รายการ

ข้อมูลสินค้า

Layer Switch
L2 Managed
ความเร็ว Port Lan
1Gbps (Gigabit)
จำนวน Port Lan
8 Port
มาตรฐานจ่ายไฟ POE
802.3af/at (30W)
จำนวน Port POE
8 Port
SFP Port Gigabit
1 Port

 

Follow us on Facebook