#803 in Computer networking products

Reddit mentions of TP-Link 8-Port Gigabit Ethernet L2 Managed Switch with 2-SFP Slots (TL-SG3210)

Sentiment score: 2
Reddit mentions: 3

We found 3 Reddit mentions of TP-Link 8-Port Gigabit Ethernet L2 Managed Switch with 2-SFP Slots (TL-SG3210). Here are the top ones.

TP-Link 8-Port Gigabit Ethernet L2 Managed Switch with 2-SFP Slots (TL-SG3210)
Buying options
View on Amazon.com
or
    Features:
  • IP-MAC-Port-VID Binding, ACL, Port Security, DoS Defend, Storm control, DHCP Snooping, 802.1X Authentication and Radius provide you robust security strategies
  • L2/L3/L4 QoS and IGMP snooping optimize voice and video application
  • WEB/CLI managed modes, SNMP, RMON bring abundant management features
  • IP-MAC-Port-VID Binding, ACL, Port Security, DoS Defend, Storm control, DHCP Snooping, 802.1X Authentication and Radius provide you robust security strategies
  • L2/L3/L4 QoS and IGMP snooping optimize voice and video application
  • WEB/CLI managed modes, SNMP, RMON bring abundant management features
  • JetStream 8-Port Gigabit L2 Managed Switch with 2 SFP Slots
  • Port Security
  • Command Line Interface
  • SSL and SSH encryptions
Specs:
Height9.85 Inches
Length15.76 Inches
Number of items1
Size10-Port
Weight5.29109424 Pounds
Width3.152 Inches

idea-bulb Interested in what Redditors like? Check out our Shuffle feature

Shuffle: random products popular on Reddit

Found 3 comments on TP-Link 8-Port Gigabit Ethernet L2 Managed Switch with 2-SFP Slots (TL-SG3210):

u/drakontas · 2 pointsr/networking

> ER6120

Here are the stats from the TPLink spec sheet for the ER6120 that make me concerned about this device:

> Concurrent Session 60000
> NAT Throughput 350Mbps
> IPsec VPN Throughput (3DES) 130Mbps

You can get far, far higher performance for only ~$200 more by using an SG2440 from store.pfsense.org instead.

Alternatively, if you're open to a 2-device solution, you can combine an SG2220 with a TPLink SG3210 and save $100 vs the SG2440 by doing MultiWAN-on-a-stick (using VLANs).

The NAT and IPSec throughput are far lower than what I'd consider acceptable for any of the deployments we do for our customers, mostly in the interest of future-proofing. The lowest-speed uplinks we're dealing with today are 200-300mbps (or 2x150mbps, 2x200mbps, 2x300mbps, etc), so a device like the ER6210 would have to be replaced in only a year or so anyway simply because it wouldn't support the growing demand of the network.

For our customers it makes sense to spend a little bit more now and get a lot more life out of the device, rather than buy a slightly cheaper device now and replace it with the next cheapest device every year or so down the road. However, you should make the choice that makes the most sense for your users.

One thing to keep in mind -- we consider TPLink's switches to be rock solid, but we always recommend having high quality vendor support for any firewall we pitch to our customers. Firewalls leave a lot of room for user error and less-savvy users frequently need hand holding when something goes wrong. If you want to be the one on the hook supporting that ER6210, that's fine, but in my opinion I'd rather have a reliable third party engineering team to fall back on for that sort of thing. That difference alone is enough to justify the small price difference for me, let alone the significant performance difference.

For a run-down of performance numbers on the pfSense store hardware, this post by one of the core developers is a reliable source:

https://www.reddit.com/r/PFSENSE/comments/3xqhqo/thinking_of_switching_to_pfsense/cy7evhu

u/HalfBurntToast · 1 pointr/homelab

There are people that could probably give better ideas than I, but I can't really recommend pfSense enough. There's so much that it does that it becomes a great learning tool and there's not much to lose. Even if you just try it out as a vbox vm in gns3.

Personally, I bought myself an inexpensive managed switch and built a pfSense router and have used both to do some really neat things. I've got VLANS + trunking, OpenVPN server, IPv6 (mostly), email reporting, static DHCP with DNS, and Snort running off of that box alone. Not enterprise grade, but enough to learn/test the concepts.

As for where to start, well I think the theory is best in this case. That's pretty much transferable anywhere. I mostly learned the theory side from the CCNA books, but the concepts are pretty much the same between vendors (minus the proprietary stuff, obviously). CBTNuggets has a pretty good series on it as well, and I've heard good things about Danscourses. You might try packet tracer if you plan to follow the Cisco side of it.

Hope that helps!