Edge-Core 8-port L2 Fast Ethernet Standalone Switch ES3510 Leaflet
Product codes
ES3510
The Edge-Core ES3510 is a high-performance Fast Ethernet Layer 2/4 switch featuring 10 ports; 8 10/100 ports and 2 combo
Gigabit Ethernet RJ-45/SFP (Small Form Factor Pluggable) ports. It is ideal for desktop Fast Ethernet connectivity and wiring closet
installations. Using IP Clustering for a virtual stack of up to 36 switches. The whole stack can be managed as a single entity with a
single IP address. This switch is packed with features and is a cost-effective solution that brings continuous availability, enhanced
security and advanced QoS to the network edge, while maintaining simplicity of management.
Gigabit Ethernet RJ-45/SFP (Small Form Factor Pluggable) ports. It is ideal for desktop Fast Ethernet connectivity and wiring closet
installations. Using IP Clustering for a virtual stack of up to 36 switches. The whole stack can be managed as a single entity with a
single IP address. This switch is packed with features and is a cost-effective solution that brings continuous availability, enhanced
security and advanced QoS to the network edge, while maintaining simplicity of management.
Product Overview
ES3510
L2 Fast Ethernet Standalone Switch
with IP Stacking
Enterprise Solution
Key Features and Benefits
www.Edge-Core.com
Performance and Scalability
It’s a great entry level managed with 5.6Gbps switching
capacity delivers wire-speed switching performance to take full
advantage of existing high-performance on PCs and laptops by
significantly improving the responsiveness of applications and
file transfer times .
advantage of existing high-performance on PCs and laptops by
significantly improving the responsiveness of applications and
file transfer times .
The device also has two Gigabit Ethernet combo ports for uplink
flexibility, allowing copper or fiber uplinks port for high speed
uplinks to servers or backbones. .
flexibility, allowing copper or fiber uplinks port for high speed
uplinks to servers or backbones. .
Continuous Availability
IEEE 802.1w Rapid Spanning Tree Protocol provides a loop-
free network and redundant links to the core network with rapid
convergence, to ensure faster recovery from failed links,
enhancing overall network stability and reliability.
free network and redundant links to the core network with rapid
convergence, to ensure faster recovery from failed links,
enhancing overall network stability and reliability.
IEEE 802.1s Multiple Spanning Tree Protocol runs STP per
VLAN base, providing Layer 2 load sharing on redundant links
up to 8 instances.
VLAN base, providing Layer 2 load sharing on redundant links
up to 8 instances.
Multicast VLAN Registration (MVR) is designed for applications
such as Media-on-Demand is using multicast traffic across an
Ethernet network.
such as Media-on-Demand is using multicast traffic across an
Ethernet network.
IGMP snooping prevents flooding of IP multicast traffic and
limits bandwidth intensive video traffic to only the subscribers.
limits bandwidth intensive video traffic to only the subscribers.
The voice VLAN feature enables access ports to carry IP voice
traffic from an IP phone.
traffic from an IP phone.
The IEEE 802.1Q-in-Q VLAN Tag is purpose to expand the
VLAN space by tagging the tagged packets,.
VLAN space by tagging the tagged packets,.
Comprehensive QoS
Traffic is prioritized according to 802.1p, DSCP, IP precedence
and TCP/UDP port number, giving optimal performance to real-
time applications such as voice and video.
and TCP/UDP port number, giving optimal performance to real-
time applications such as voice and video.
Asymmetric bidirectional rate-limiting, per port or per traffic class,
preserves network bandwidth and allowing maximum control of
network resources.
preserves network bandwidth and allowing maximum control of
network resources.
Enhanced Security
Port Security ensures access to switch ports based on MAC
address, limits the total number of devices from using a switch
port and protects against MAC flooding attacks.
address, limits the total number of devices from using a switch
port and protects against MAC flooding attacks.
IEEE 802.1x port-based or MAC-based access control
ensures all users are authorized before being granted access
to the network. User authentication is carried out using any
standard-based dynamic VLAN assignment with RADIUS
server by guest VLAN.
ensures all users are authorized before being granted access
to the network. User authentication is carried out using any
standard-based dynamic VLAN assignment with RADIUS
server by guest VLAN.
Access Control Lists (ACLs) can be used to restrict access to
sensitive network resources by denying packets based on
source and destination MAC addresses, IP addresses,
TCP/UDP ports. This is done by hardware, so switching
performance is not compromised.
sensitive network resources by denying packets based on
source and destination MAC addresses, IP addresses,
TCP/UDP ports. This is done by hardware, so switching
performance is not compromised.
Security Shell (SSHv1.5/v2.0) and Secure Sockets Layer
(SSL/HTTPS) encrypt network management information via
Telnet and web, providing secure network management.
(SSL/HTTPS) encrypt network management information via
Telnet and web, providing secure network management.
TACACS+3.0 Authentication for applications such as network
access or IP mobility enables centralized control of the switch
and restricts unauthorized users from altering the configuration
of the switch.
access or IP mobility enables centralized control of the switch
and restricts unauthorized users from altering the configuration
of the switch.
Private VLAN isolates edge ports to ensure user privacy.
Simple Management
Industry standard Command Line Interface (CLI) via console
port or Telnet provides a common user interface and
command set for users to manipulate the switch.
port or Telnet provides a common user interface and
command set for users to manipulate the switch.
IP Source Guard is enabled on a trunk port with a large
number of VLANs that have DHCP snooping enabled, you
might run out of ACL
number of VLANs that have DHCP snooping enabled, you
might run out of ACL
DHCP snooping provides security by filtering un-trusted DHCP
messages and by building and maintaining a DHCP snooping
binding table
messages and by building and maintaining a DHCP snooping
binding table
DHCP Option 82 is feature has a device add information to
client TCP/IP configuration requests that it relays to a DHCP
server.
client TCP/IP configuration requests that it relays to a DHCP
server.