Atención Telefónica:

  • Gdl. (33) 8526-1971
  • | D.F.(55) 8526 5651
  • | Mty. (81) 8526-1969

Horario: Lunes a Viernes de 10:00 a 14:00 y 16:30 a 19:00 hrs.

Switch cisco smb 24 puertos 10/ 100/ 1000 gigabit ethernet poe 195w, ethernet 4 puertos combo rj-45 sfp
Código Fabricante: CBS350-24P-4G-NA

Se encuentra en la categoría:

SWITCH CISCO SMB 24 PUERTOS 10/ 100/ 1000 GIGABIT ETHERNET POE 195W,  ETHERNET 4 PUERTOS COMBO RJ-45 SFP - TiendaClic.mx
Vendedor regional
  • Producto: Switch cisco smb 24 puertos 10/ 100/ 1000 gigabit ethernet poe 195w, ethernet 4 puertos combo rj-45 sfp
  • Marca: Cisco
  • Número de Parte: CBS350-24P-4G-NA
$13,838.21 pesos
con IVA incluido
Existencia Aproximada:
0 piezas
Aunque se hace un esfuerzo por tratar de mantener actualizadas las imágenes e información técnica de los productos existentes en el sitio, es posible que los productos pudieran no corresponder a las imágenes o haber errores en la información técnica proporcionada. Es por eso que se proporciona el número de parte o código de producto con el cual es posible conocer la fotografía actualizada y descripciones técnicas en la página web de la marca o fabricante.
Forma de Pago Precio
Contado 13,838.21 pesos
Tarjeta de Crédito 1 Pago
(Paypal)
14,418.97 pesos
Tarjeta de Crédito 3 Meses
(Paypal)
15,136.37 pesos
Tarjeta de Crédito 6 Meses
(Paypal)
15,596.85 pesos
Tarjeta de Crédito 9 Meses
(Paypal)
16,332.99 pesos
Tarjeta de Crédito 12 Meses
(Paypal)
16,778.43 pesos

Información General

Switches empresariales cisco de la serie 350 los conmutadores cisco business de la serie 350, que forman parte de la línea de soluciones de red cisco business, son una cartera de conmutadores gestionados asequibles que proporcionan un componente fundamental para cualquier red de oficina. el panel de control intuitivo simplifica la configuración de la red y las funciones avanzadas aceleran la transformación digital, mientras que la seguridad generalizada protege las transacciones comerciales críticas. los switches cisco business de la serie 350 brindan la combinación ideal de asequibilidad y capacidades para oficinas y lo ayudan a crear una fuerza laboral más eficiente y mejor conectada. todos los conmutadores cisco business de la serie 350 admiten las capacidades de administración de seguridad avanzadas y las funciones de red que necesita para admitir tecnologías inalámbricas, de seguridad, de voz y de datos de clase empresarial. . al mismo tiempo, estos conmutadores son fáciles de implementar y configurar, lo que le permite aprovechar los servicios de red administrados que su empresa necesita.

Información Tecnica

Capacidad de conmutación 56 gbps tabla de direcciones mac 16000 direcciones jumbo frame hasta 9k bytes. La mtu predeterminada es 2k bytes frame sizes up to 9k bytes. The default mtu is 2k bytes puertos totales del sistema 28 gigabit ethernet puertos rj-45 24 gigabit ethernet puertos combo (rj-45 + sfp) 4 sfp energía dedicada a poe 195w numero de puestos que soportan poe 24 dimensiones 445 x 299 x 44 mm (17. 5 x 11. 76 x 1. 73 pulgadas) peso 3. 53 kg (7. 78 lb) layer 2 switching spanning tree protocol standard 802. 1d spanning tree support fast convergence using 802. 1w (rapid spanning tree [rstp]), enabled by default multiple spanning tree instances using 802. 1s (mstp); 8 instances are supported per-vlan spanning tree plus (pvst+) and rapid pvst+ (rpvst+); 126 instances are supported port grouping/link aggregation support for ieee 802. 3ad link aggregation control protocol (lacp) and #9679;  up to 8 groups and #9679;  up to 8 ports per group with 16 candidate ports for each (dynamic) 802. 3ad link aggregation vlan support for up to 4,094 vlans simultaneously port-based and 802. 1q tag-based vlans; mac-based vlan; protocol-based vlan; ip subnet-based vlan management vlan private vlan with promiscuous, isolated, and community port private vlan edge (pve), also known as protected ports, with multiple uplinks guest vlan, unauthenticated vlan dynamic vlan assignment via radius server along with 802. 1x client authentication cpe vlan voice vlan voice traffic is automatically assigned to a voice-specific vlan and treated with appropriate levels of qos. Auto voice capabilities deliver network wide zero-touch deployment of voice endpoints and call control devices multicast tv vlan multicast tv vlan allows the single multicast vlan to be shared in the network while subscribers remain in separate vlans. This feature is also known as multicast vlan registration (mvr) vlan translation support for vlan one-to-one mapping. In vlan one-to-one mapping, on an edge interface customer vlans (c-vlans) are mapped to service provider vlans (s-vlans) and the original c-vlan tags are replaced by the specified s-vlan q-in-q vlans transparently cross a service provider network while isolating traffic among customers selective q-in-q selective q-in-q is an enhancement to the basic q-in-q feature and provides, per edge interface, multiple mappings of different c-vlans to separate s-vlans selective q-in-q also allows configuring of ethertype (tag protocol identifier [tpid]) of the s-vlan tag layer 2 protocol tunneling over q-in-q is also supported generic vlan registration protocol (gvrp)/generic attribute registration protocol (garp) generic vlan registration protocol (gvrp) and generic attribute registration protocol (garp) enable automatic propagation and configuration of vlans in a bridged domain unidirectional link detection (udld) udld monitors physical connection to detect unidirectional links caused by incorrect wiring or cable/port faults to prevent forwarding loops and black holing of traffic in switched networks dynamic host configuration protocol (dhcp) relay at layer 2 relay of dhcp traffic to dhcp server in different vlan; works with dhcp option 82 internet group management protocol (igmp) versions 1, 2, and 3 snooping igmp limits bandwidth-intensive multicast traffic to only the requesters; supports 2k multicast groups (source-specific multicasting is also supported) igmp querier igmp querier is used to support a layer 2 multicast domain of snooping switches in the absence of a multicast router head-of-line (hol) blocking hol blocking prevention loopback detection loopback detection provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of stp layer 3 ipv4 routing wirespeed routing of ipv4 packets up to 990 static routes and up to 128 ip interfaces ipv6 routing wirespeed routing of ipv6 packets layer 3 interface configuration of layer 3 interface on physical port, link aggregation (lag), vlan interface, or loopback interface classless interdomain routing (cidr) support for classless interdomain routing policy-based routing (pbr) flexible routing control to direct packets to different next hop based on ipv4 or ipv6 access control list (acl) dhcp server switch functions as an ipv4 dhcp server serving ip addresses for multiple dhcp pools/scopes support for dhcp options dhcp relay at layer 3 relay of dhcp traffic across ip domains user datagram protocol (udp) relay relay of broadcast information across layer 3 domains for application discovery or relaying of bootstrap protocol (bootp)/dhcp packets stacking hardware stack up to 4 units in a stack. Up to 192 ports managed as a single system with hardware failover high availability fast stack failover delivers minimal traffic loss. Support link aggregation across multiple units in a stack plug-and-play stacking configuration/management master/backup for resilient stack control autonumbering hot swap of units in stack ring and chain stacking options, auto stacking port speed, flexible stacking port options high-speed stack interconnects cost-effective high-speed 10g fiber interfaces. Security secure shell (ssh) protocol ssh is a secure replacement for telnet traffic. Secure copy protocol (scp) also uses ssh. Ssh v1 and v2 are supported secure sockets layer (ssl) ssl support: encrypts all https traffic, allowing highly secure access to the browser-based management gui in the switch ieee 802. 1x (authenticator role) 802. 1x: remote authentication dial-in user service (radius) authentication and accounting, md5 hash; guest vlan; unauthenticated vlan, single/multiple host mode and single/multiple sessions supports time-based 802. 1x; dynamic vlan assignment web-based authentication web-based authentication provides network admission control through web browser to any host devices and operating systems stp bridge protocol data unit (bpdu) guard a security mechanism to protect the network from invalid configurations. A port enabled for bpdu guard is shut down if a bpdu message is received on that port. This avoids accidental topology loops stp root guard this prevents edge devices not in the network administrator’s control from becoming spanning tree protocol root nodes stp loopback guard provides additional protection against layer 2 forwarding loops (stp loops) dhcp snooping filters out dhcp messages with unregistered ip addresses and/or from unexpected or untrusted interfaces. This prevents rogue devices from behaving as dhcp servers. Ip source guard (ipsg) when ip source guard is enabled at a port, the switch filters out ip packets received from the port if the source ip addresses of the packets have not been statically configured or dynamically learned from dhcp snooping. This prevents ip address spoofing. Dynamic arp inspection (dai) the switch discards arp packets from a port if there are no static or dynamic ip/mac bindings or if there is a discrepancy between the source or destination addresses in the arp packet. This prevents man-in-the-middle attacks. Ip/mac/port binding (ipmb) the preceding features (dhcp snooping, ip source guard, and dynamic arp inspection) work together to prevent dos attacks in the network, thereby increasing network availability secure core technology (sct) makes sure that the switch will receive and process management and protocol traffic no matter how much traffic is received secure sensitive data (ssd) a mechanism to manage sensitive data (such as passwords, keys, and so on) securely on the switch, populating this data to other devices, and secure autoconfig. Access to view the sensitive data as plaintext or encrypted is provided according to the user-configured access level and the access method of the user. Trustworthy systems trustworthy systems provide a highly secure foundation for cisco products run-time defenses (executable space protection [x-space], address space layout randomization [aslr], built-in object size checking [bosc]) private vlan private vlan provides security and isolation between switch ports, which helps ensure that users cannot snoop on other users’ traffic; supports multiple uplinks layer 2 isolation private vlan edge (pve) with community vlan pve (also known as protected ports) provides layer 2 isolation between devices in the same vlan, supports multiple uplinks port security ability to lock source mac addresses to ports and limits the number of learned mac addresses radius/tacacs+ supports radius and tacacs authentication. Switch functions as a client radius accounting the radius accounting functions allow data to be sent at the start and end of services, indicating the amount of resources (such as time, packets, bytes, and so on) used during the session storm control broadcast, multicast, and unknown unicast dos prevention denial-of-service (dos) attack prevention multiple user privilege levels in cli level 1, 7, and 15 privilege levels acls support for up to 1,024 rules drop or rate limit based on source and destination mac, vlan id, ipv4 or ipv6 address, ipv6 flow label, protocol, port, differentiated services code point (dscp)/ip precedence, transmission control protocol/user datagram protocol (tcp/udp) source and destination ports, 802. 1p priority, ethernet type, internet control message protocol (icmp) packets, igmp packets, tcp flag; acl can be applied on both ingress and egress sides time-based acls supported quality of service priority levels 8 hardware queues