What Functions Does The Managed Switch Have More Than The Fool Switch?

- Nov 04, 2020-

Now that the network is so popular, the demand for switches is becoming more and more important. With so many models of switches on the market, we have analyzed how to distinguish switches according to different situations before, but when browsing the names, we will also find that many switches In the introduction, both the managed switch and the unmanaged switch are written. The literal meaning of the switch is clearly expressed. This time I will summarize what this "network management" does.

poe switch-24 port

Unmanaged switch


First of all, let's talk about unmanaged switches. Unmanaged switches are also called fool-type switches. Simply put, they don't directly process data, just plug in the network cable.


The unmanaged switch belongs to the data link layer device. It can identify the MAC address information in the data packet, and then forward it according to the MAC address, and record these MAC addresses and corresponding ports in an internal address table.

Its advantage is that it is easy to use, plug and play, can be used in a large number of series, suitable for use in places with high PC equipment density, and it is cheap to save money.


Managed Switch


The network management switch means literally, the switch that can be managed by the network, there are three management methods, which can be managed through the serial port, through the Web, and through the network management software.

The data of the network management switch will be configured through the Simple Network Management Protocol (SNMP). The SNMP protocol is currently the most widely used network management protocol based on TCP/IP networks, which can perform data address, port, protocol type, service, etc. Filter, usually also has VLAN division function.


The task of the managed switch is to keep all network resources in good condition. The network management switch product provides a variety of network management methods based on the terminal control port (Console), based on the Web page, and supports Telnet remote login to the network. Therefore, network administrators can perform local or remote real-time monitoring of the working status of the switch and network operation status, and manage the working status and working mode of all switching ports in a global view.

HR-AFGM-244S-2

What are the advantages of managed switches:


1. Large backplane bandwidth and faster data forwarding speed;


2. There are many types of ports provided, and different interface forms such as SFP, GE, fast Ethernet, Ethernet, etc. can be selected according to the application of the network;


3. Support vlan division, users can divide areas for different applications, effectively control and manage the network, and further suppress broadcast storms;


4. Large data throughput, low packet loss rate and low delay;


5. Link aggregation allows switches and switches and switches and servers to be bound together through multiple Ethernet ports to achieve load balancing;

6. Data information flow can be controlled based on source, destination, and network segment;


7. With ARP protection function, it improves the reduction of network ARP spoofing;


8. MAC address can be bound;


9. The port mirroring function can copy the traffic and status of one port to another port of the switch for supervision;


10. Support DHCP function;


11. The access control list can control IP data packets, such as restricting its traffic, access, and providing QoS, etc.;


12. It has good security performance, can filter and lock MAC addresses, and can build a static MAC forwarding table;


13. It can support IEEE802.1Q and VLAN based on port technology. And GVRP (GARP, VLAN Registration Protocol) and GMRP (GARP Multicast Registration Protocol) involved in IEEE802.1QVLAN are also widely supported;


14. With SNMP function, it can better manage and control the network;


15. Easy to expand and flexible application, it can be managed through network management software, and it can also be accessed remotely through its own access control to increase the security and controllability of the network.