MS120-24-HW

Payment Options

+971 428 40025

Call for Price

 

MS120-24-HW Specifications
Interfaces • 24 × 10/100/1000BASE-T RJ45 (auto-negotiation, auto-MDIX)
• 4 × 1GbE SFP uplink
• RJ45 Management port
Switching Capacity 56 Gbps
Forwarding Rate 41.67 mpps
Idle / Full Load Power 8 W / 18 W
Power Supply Configuration Fixed internal
What’s Included 1 × Rack mounting screw kit
Dimensions (H × W × D) 1.72 × 17.32 × 9.84” (4.40 × 44 × 25 cm)
Weight 8.09 lb (3.67 kg)
Management • Managed via Meraki cloud platform
• Integrated with Meraki Wireless & full portfolio
• Zero-touch remote provisioning
• Virtual Stacking for unified management
• Historical per-port and per-client statistics
• DHCP, client & hostname fingerprinting
• SNMPd & SYSLOG support
• Automatic firmware upgrades (scheduled)
Layer 3 DHCP Relay
Remote Diagnostics • Email, SMS & mobile alerts
• Cable testing & link failure detection
• Live remote packet capture
• Dynamic topology & discovery
• Combined event/config change logs
Power • Input: 100–240 VAC, 47–63 Hz
• Consumption: 8–908 W
Mounting • 1U Rack-mountable (included hardware)
• 2-post front mounting options
• Desktop-mountable with feet
Ethernet Switching Capabilities • 802.1p QoS (8 queues, DSCP-to-CoS mapping)
• 802.1Q VLANs (up to 4,094)
• 802.1w / 802.1D RSTP, STP
• Broadcast storm control
• LLDP & CDP
• 802.3ad Link aggregation (up to 8 ports)
• MC-LAG supported
• Port mirroring
• IGMP snooping
• MAC table: 16K entries
Environment • Operating temp: 0°C to 45°C
• Humidity: 5–95% non-condensing
• Fanless operation
Regulatory • CSA-US
• FCC
• IC
• CE
• RCM
• RoHS
Security • Two-factor authentication
• Role-based access control
• Password policy enforcement
• 802.1X RADIUS & MAB
• Multi-Domain/Host Authentication
• Port security (Sticky MAC, whitelisting)
• DHCP snooping & Dynamic ARP Inspection
• STP protections (BPDU, Root, Loop guard)
• IPv4 & IPv6 ACLs
MTBF 707,873 hours

Related Products

Secure Your Business Before a Cyber Attack Happens

Get a professional cybersecurity assessment and identify vulnerabilities before hackers do.