The TL-SG3424P provides 24 10/100/1000Mbps ports that supports 802.3at/af compliant PoE , with a total PoE power supply up to 320W, powerful and flexible enough for users to deploy wireless access points or IP-based network surveillance cameras. The switch also comes equipped with 4 combo SFP slots, expanding your network flexibly. In addition, it provides high performance, enterprise-level QoS, advanced security strategies and rich layer 2 management features. With all these advanced features, the JetStream Gigabit L2 Managed PoE Switch is an ideal choice for small and medium business networking. TL-SG3424P has robust security and management features. The IP-MAC-Port-VID Binding and Access Control List (ACL) functions protect against broadcast storm, ARP and Denial-of-Service (DoS) attacks, etc. Quality of Service (QoS, L2 to L4) provides enhanced traffic management capabilities to move your data smoother and faster. Anymore, the easy-to-use web management interfaces, along with CLI, SNMP and RMON, mean faster setup and configuration with less downtime. For workgroup and departments requiring cost-sensitive Layer 2 Switch and gigabit capability, TP-LINK JetStream Gigabit L2 Managed PoE Switch TL-SG3424P provides you the ideal access-edge solution.
The TL-SG3424P supports 24 ports of IEEE 802.3at/af compliant PoE and has a total power supply of 320W to power any 802.3at or 802.3af compliant power device. It's an efficient and cost-effective choice to work with wireless access points, surveillance cameras, IP phones and other PoE supported devices, while getting rid of cables or power lines running around. Compact and flexible, the TL-SG3424P is ideal to flexibly use PoE to deploy wireless access points or IP-based network surveillance cameras for projects or small business networks. This JetStream Gigabit L2 Managed PoE Switch provides IP-MAC-Port-VID Binding, Port Security, Storm control and DHCP Snooping which protect against broadcast storms, ARP attacks, etc. It integrates some typical DoS attacks to select. You can protect these attacks more easily ever than before. In addition, the Access Control Lists (ACL, L2 to L4) feature restricts access to sensitive network resources by denying packets based on source and destination MAC address, IP address, TCP/UDP ports and even VLAN ID. Moreover, the switch supports 802.1X authentication, which is used in conjunction with a RADIUS server to require some authentication information before access to the network is allowed. Guest VLAN function supports to enable the non-802.1X clients to access the specific network resource.