MS250-48FP-HW

Payment Options

+971 428 40025

Call for Price

 

Category Specification
Interfaces • 48 × 10/100/1000BASE-T RJ45 (auto-negotiation, auto-MDIX)
• 4 × SFP+ 10GbE uplinks
• 2 × stacking ports
Switching Capacity 176 Gbps
Stacking Bandwidth 80G (dual interface)
Available PoE+ Power 740 W
Idle / Full Load Power 54 W / 882 W
Power Supply Configuration Hot-swappable
Supported Power Supply 2 × 640 W PSU
What’s Included 1 × MA-PWR-640WAC power supply, mounting screw kit
Dimensions 1.72 × 19 × 13.38 in (4.38 × 48.46 × 34 cm)
Weight 9.63 lb (4.37 kg)
Forwarding Rate 127.98 mpps
Management • Managed via Meraki cloud Dashboard
• Integrated with Meraki wireless & full portfolio
• Zero-touch provisioning
• Per-port & per-client stats
• DHCP/client/hostname fingerprinting
• SNMPd & SYSLOG support
• Automatic firmware upgrades
Remote Diagnostics • Email/SMS/push alerts
• Cable testing & link failure detection
• Live remote packet capture
• Interactive network topology
• Combined event/config logs
Stacking • Up to 8 switches physical stacking (80 Gbps)
• Virtual stacking across thousands of ports
Power • Input: 100–240 VAC, 47–63 Hz
• Consumption: 5–1655 W
Layer 3 • Static routing, OSPFv2
• Warm spare (VRRP)
• DHCP Relay, DHCP Server
Mounting • 1U rack-mountable
• 2-post mounting option
• Desktop feet included
Ethernet Switching Capabilities • 802.1p QoS (8 queues)
• 802.1Q VLANs (4094)
• RSTP/STP (802.1w/802.1D)
• Broadcast storm control
• LLDP & CDP
• 802.3ad link aggregation (up to 8 ports)
• Multichassis LAG on stacked switches
• Port mirroring
• IGMP snooping
• MAC table: 32K entries
Environment • Operating temp: -5°C to 50°C
• Humidity: 5–95% non-condensing
• Variable-speed fans
Regulatory • CSA-US
• FCC
• IC
• CE
• RCM
• RoHS
Security • 2-factor authentication (Dashboard)
• RBAC controls
• Password policy enforcement
• 802.1X, MAB, hybrid auth
• Multi-domain/host auth
• Port security (sticky MAC, whitelist)
• DHCP snooping, DAI
• BPDU guard, root guard, loop guard
• IPv4/IPv6 ACLs
MTBF Rating 339,906 hours

Related Products

Secure Your Business Before a Cyber Attack Happens

Get a professional cybersecurity assessment and identify vulnerabilities before hackers do.