The TL-SG3216 JetStream 16-Port Gigabit L2 Managed Switch with 2 Combo SFP Slots from TP-Link provides secure networking, advanced QoS, abundant layer 2, and enterprise level management features. Along with these important features you can also take advantage of a variety of management features such as a web-based GUI, command line interface, SNMP v1/v2c/v3, and RMON (1,2,3,9 group).
The layer 2 functionality of the TL-SG3216 coincides with the open systems interconnection model or OSI model. The second layer of this model, the data link layer, is where the basic connections occur in a network. This layer provides the functional and procedural means to transfer data between network entities as well as detection and possible correction of errors that may occur in the previous layer, the physical layer. Some of the layer two features include 802.1Q tag VLAN, port mirroring, link aggregation control protocol, and 802.3x flow control functionality.
802.1Q tag VLAN support provides the backbone for the VLANs as it defines the system of VLAN tagging for Ethernet frames. Port mirroring is used on a network switch to send a copy of network packets seen on one switch port to a network monitoring connection on another switch port. Link aggregation control protocol allows for streamlining of network communications by combining multiple network connections in parallel. 802.3x flow control functionality helps the administrator control the flow of packets through each port on the switch.
Managing your network via the TL-SG3216 switch is simple with web-based GUI and CLI management. With web based GUI, you can take full control of your network with easy to manipulate controls; CLI management, on the other hand, gives you more in depth complete control over virtually every aspect of the switch. Security features include IP-MAC-PORT-VID binding, IEEE 802.1X port/MAC based authentication, radius, guest VLAN, DoS defence, dynamic ARP inspection, SSH v1/v2, SSL v2/v3/TLSv1, port security, and broadcast/multicast/unknown-unicast storm control. Each of these security features gives you complete control over virtually every security facet of your network ensuring your data remains secure.