Chapter 2 Introduction
Thanks for choosing the TL-SG3210/TL-SG3216/TL-SG3424/TL-SG3424P JetStream L2
Managed Switch!
2.1 Overview of the Switch
Designed for workgroups and departments, TL-SG3210/TL-SG3216/TL-SG3424/TL-SG3424P
from TP-LINK provides wire-speed performance and full set of layer 2 management features. It
provides a variety of service features and multiple powerful functions with high security.
The EIA-standardized framework and smart configuration capacity can provide flexible solutions
for a variable scale of networks. ACL, 802.1x and Dynamic ARP Inspection provide robust security
strategy. QoS and IGMP/MLD snooping optimize voice and video application. Link aggregation
(LACP) increases aggregated bandwidth, optimizing the transport of business critical data.
SNMP/SNMPv6, RMON, WEB/CLI/Telnet Log-in bring abundant management policies.
TL-SG3210/TL-SG3216/TL-SG3424/TL-SG3424P switch integrates multiple functions with
excellent performance, and is friendly to manage, which can fully meet the need of the users
demanding higher networking performance.
2.2 Main Features
• Resiliency and Availability
+ Link aggregation (LACP) increases aggregated bandwidth, optimizing the transport of
business critical data.
+ IEEE 802.1s Multiple Spanning Tree provides high link availability in multiple VLAN
environments.
+ IGMP snooping and MLD snooping automatically prevents flooding of IP multicast traffic.
+ Root Guard protects root bridge from malicious attack or configuration mistakes
• Layer 2 Switching
+ GVRP (GARP VLAN Registration Protocol) allows automatic learning and dynamic
assignment of VLANs.
+ Supports up to 4K VLANs simultaneously (out of 4K VLAN IDs).
• Quality of Service
+ Supports L2/L3 granular CoS with 4 priority queues per port.
+ Rate limiting confines the traffic flow accurately according to the preset value.
• Security
+ Supports multiple industry standard user authentication methods such as 802.1x, RADIUS.
+ Dynamic ARP Inspection blocks ARP packets from unauthorized hosts, preventing
man-in-the-middle attacks.
+ L2/L3/L4 Access Control Lists restrict untrusted access to the protected resource.
+ Provides SSHv1/v2, SSL 2.0/3.0 and TLS v1 for access encryption for both IPv4 and IPv6.
• Manageability
+ IP Clustering provides high scalability and easy Single-IP-Management.
6