6
Chapter 2 Introduction
Thanks for choosing the TL-SL5428E 24-Port 10/1 4-Port Gigabit L2 Managed Switch!
2.1 Overview of the Switch
Designed for workgroups and departments, TL-SL5428E from TP-Link provides wire-speed
performance and full set of layer 2 management features. It provides a variety of service features
and multiple powerful functions with high security.
The EIA-standardized framework and smart configuration capacity can provide flexible solutions
for a variable scale of networks. ACL, 802.1x, IP Source Guard and Dynamic ARP Inspection
provide robust security strategy. QoS and IGMP snooping/filtering optimize voice and video
application. Link aggregation (LACP) increases aggregated bandwidth, optimizing the transport of
business critical data. SNMP, RMON, WEB/CLI/Telnet Log-in bring abundant management
policies. TL-SL5428E Switch integrates multiple functions with excellent performance, and is
friendly to manage, which can fully meet the need of the users demanding higher networking
performance.
2.2 Main
Features
•
Resiliency and Availability
+ Link aggregation (LACP) increases aggregated bandwidth, optimizing the transport of
business critical data.
+ IEEE 802.1s Multiple Spanning Tree provides high link availability in multiple VLAN
environments.
+ Multicast snooping automatically prevents flooding of IP multicast traffic.
+ Root Guard protects root bridge from malicious attack or configuration mistakes
•
Layer 2 Switching
+ GVRP (GARP VLAN Registration Protocol) allows automatic learning and dynamic
assignment of VLANs.
+ Supports 255 active VLAN groups and 4K VLAN IDs.
•
Quality of Service
+ Supports L2/L3 granular CoS with 4 priority queues per port.
+ Rate limiting confines the traffic flow accurately according to the preset value.
•
Security
+ Supports multiple industry standard user authentication methods such as 802.1x, RADIUS.
+ IP Source Guard prevents IP spoofing attacks.
+ Dynamic ARP Inspection blocks ARP packets from unauthorized hosts, preventing
man-in-the-middle attacks.
+ L2/L3/L4 Access Control Lists restrict untrusted access to the protected resource.
+ Provides SSHv1/v2, SSL 2.0/3.0 and TLS v1 for access encryption.
•
Manageability
+ IP Clustering provides high scalability and easy Single-IP-Management.