We are currently closed, But will be open shortly
Shopping Cart
tp-link JetStream 8-Port 10GE SFP+ L2+ Managed Switch
(image for) tp-link JetStream 8-Port 10GE SFP+ L2+ Managed Switch
(image for) tp-link JetStream 8-Port 10GE SFP+ L2+ Managed Switch
(image for) tp-link JetStream 8-Port 10GE SFP+ L2+ Managed Switch
  • In Stock: 0
  • Manufactured by: tp-link

tp-link JetStream 8-Port 10GE SFP+ L2+ Managed Switch

$405.77
Product OverviewFull Fibre Switch with Lightning-Fast 10GBuild and expand your lightning-fast network with TP-Link TL-SX3008F — a fully managed switch with full 8-port 10G fibre ports and 160 Gbps switching capacity. Ideal for small, medium, and large business networks, it meets and surpasses the...
  • Manufactured by: tp-link
  • This product was added to our catalog on .

Product Overview

Full Fibre Switch with Lightning-Fast 10G

Build and expand your lightning-fast network with TP-Link TL-SX3008F — a fully managed switch with full 8-port 10G fibre ports and 160 Gbps switching capacity. Ideal for small, medium, and large business networks, it meets and surpasses the needs for high-speed, reliable, and safe enterprise networks.

Seamless Integration to Omada Cloud SDN

Omada’s Software Defined Networking (SDN) platform integrates network devices, including access points, switches, and routers, providing 100% centralised cloud management. Omada creates a highly scalable network—all controlled from a single interface. Seamless wireless and wired connections are provided, ideal for use in hospitality, education, retail, offices, and more.

Advanced L3

There are currently no product reviews.

Features

An abundance of L2+ and L3 features are supported to help build a highly scalable and robust network, providing a reliable and efficient solution for enterprises, campuses and ISPs.

Secure Networking

Our high-quality security features defend against a range of network threats. They include IP-MAC-Port-VID Binding, Port Security, Storm Control, and DHCP Snooping. An integrated list of common DoS attacks is available, making it easier than ever to prevent them. The Access Control Lists (ACL, L2 to L4) restrict access to sensitive network resources by denying packets based on source and destination MAC address, IP address, TCP/UDP ports, or VLAN ID. User access to the network can be controlled through 802.1X authentication to grant access according to the valid user credentials.

Enterprise Level

Back to Top