The ECS2000 series is clearly predestined for small and medium-sized enterprise networks or CCTV systems where reliable transmission performance is required. The switch is packed with features and is a cost-effective solution that delivers continuous performance availability (IEEE 802.3ad and IEEE 802.1w), VLAN Segment Support, and QoS sorting with Priority Classification in Layer 2. SFP ports add flexibility to connect to other networks. Optional Gigabit Ethernet SFP transceivers are selected according to transmission distance requirements. Large optical distances can easily overcome the optical cable.
The ECS2000 series is clearly predestined for small and medium-sized enterprise networks or CCTV systems where reliable transmission performance is required. The switch is packed with features and is a cost-effective solution that delivers continuous performance availability (IEEE 802.3ad and IEEE 802.1w), VLAN Segment Support, and QoS sorting with Priority Classification in Layer 2. SFP ports add flexibility to connect to other networks. Optional Gigabit Ethernet SFP transceivers are selected according to transmission distance requirements. Large optical distances can easily overcome the optical cable.
IEEE802.1w Rapid Spanning Tree Protocol provides faster network recovery from unsuccessful operations, increasing overall network stability and reliability. The IEEE 802.3ad Link Aggregation Control Protocol (LACP) increases bandwidth by automatically aggregating several physical connections and balancing their load even in the event of an uplink failure. The VLAN under effective IEEE 802.1Q management reduces broadcasting, thereby increasing the security and flexibility of the transmission itself. QoS gives optimal performance to applications such as VoIP telephony or video transfer to receive real-time data and nothing has happened . QoS has eight queues on a differential management port for up to eight types of traffic and 802.1p or DSCP priority.
You can secure access to ports based on MAC address. This limits the overall access to the switch to the required devices only and protects you from DOS attacks . Port Access Control (IEEE 802.1X) ensures user authentication before granting access to the network. User authentication is performed using a RADIUS-based standard. Access Control Lists (ACL) restricts access to sensitive network resources by not dropping packets that do not match the source and target MAC addresses, IP addresses, and TCP / UDP ports. ACL supports hardware, so it does not restrict switching performance. SSH (Secure Shell) and Secure Sockets Layer (SSL / HTTPS) encrypt Telnet and web access to the secure network management switch. DHCP snooping provides security by filtering untrusted DHCP.
Specifications can be changed without notice. Images are for illustrative purposes only.
We use 8 categories of cookies on our website:
Technical cookies
These are strictly necessary for the functioning of the website and the features you choose to use. Without them, our website would not work; you wouldn't be able to log in to your user account, for example.Functionality cookies
These cookies allow us to remember your basic choices and improve the user experience. These include remembering your preferred language or allowing you to stay logged in permanently.Social media cookies
These cookies allow us to easily link you to your social media profile and, for example, allow you to share products and services with your friends and family.Content personalisation
These cookies allow us to show you content and ads according to the information we have about you to best meet your needs. This includes what content you have viewed, or on what device you are accessing our website.Non-personalised advertising
These cookies allow us to show you general ads for products and services.Personalised advertising
Thanks to these cookies, we and our partners can offer you relevant products and services based on your purchases, your shopping behaviour and your preferences.Audience metrics
These cookies allow us to optimise our site for your convenience based on how you use it. The aim is to remember or anticipate your choices. This includes, for example, the use of features, their location, or the behaviour on the page.Third party cookies
These are third party cookies, and you can find out more about them and our partners here.By giving your consent to the processing of cookies, functionality and analytical cookies will be installed on the device you use to browse the website (click on the "I understand" button for both categories, or you can select only one of the categories by clicking on the "Settings" button). We always install technical cookies on your device, even without your explicit consent, because without them our website would simply not work.
You can revoke your consent to the processing of cookies. In connection with our company's cookie processing, you also have the following rights: the right to access cookies, delete, modify, supplement and correct them, restrict processing and the right to lodge a complaint with the Office for Personal Data Protection. Read more about your rights.
For even more detailed information about how we process cookies, please see our Personal Data Protection Policy.