🎉 Up to 70% Off Selected ItemsShop Sale
CISCO Catalyst (C1300-16T-2G) 16-Port Managed Switch
HomeStore

CISCO Catalyst (C1300-16T-2G) 16-Port Managed Switch

CISCO Catalyst (C1300-16T-2G) 16-Port Managed Switch

$136.61

Original: $455.36

-70%
CISCO Catalyst (C1300-16T-2G) 16-Port Managed Switch

$455.36

$136.61

The Story

Feature

Description

Performance

Switching capacity and forwarding rate

All switches are wire speed and nonblocking

Model

Capacity in Millions of PacketsPerSecond(mpps) (64-byte packets)

Switching capacity in Gigabitspersecond(Gbps)

C1300-8FP-2G

14.88

20.0

C1300-8T-E-2G

14.88

20.0

C1300-8P-E-2G

14.88

20.0

C1300-16T-2G

26.78

36.0

C1300-16P-2G

26.78

36.0

C1300-16FP-2G

26.78

36.0

C1300-24T-4G

41.66

56.0

C1300-24P-4G

41.66

56.0

C1300-24FP-4G

41.66

56.0

C1300-48T-4G

77.38

104.0

C1300-48P-4G

77.38

104.0

C1300-48FP-4G

77.38

104.0

C1300-16P-4X

83.32

112.0

C1300-24T-4X

95.23

128.0

C1300-24P-4X

95.23

128.0

C1300-24FP-4X

95.23

128.0

C1300-48T-4X

130.94

176.0

C1300-48P-4X

130.94

176.0

C1300-48FP-4X

130.94

176.0

C1300-8MGP-2X

41.66

56

C1300-24MGP-4X

113.08

152

C1300-48MGP-4X

166.65

224

C1300-12XT-2X

208.33

280

C1300-12XS

178.57

240

C1300-16XTS

238.1

320

C1300-24XS

357.14

480

C1300-24XT

357.14

480

C1300-24XTS

357.12

480

Layer 2 switching

Spanning Tree Protocol

Standard 802.1d Spanning Tree support

Fast convergence using 802.1w (Rapid Spanning Tree [RSTP]), enabled by default Multiple Spanning Tree instances using 802.1s (MSTP); 8 instances are supported

Per-VLAN Spanning Tree Plus (PVST+) and Rapid PVST+ (RPVST+); 126 instances are supported

Port grouping/link aggregation

●  Support for IEEE 802.3ad Link Aggregation Control Protocol (LACP)
●  Up to 8 groups
●  Up to 8 ports per group with 16 candidate ports for each (dynamic) 802.3ad link aggregation

VLAN

Support for up to 4093 VLANs simultaneously

Port-based and 802.1Q tag-based VLANs, MAC-based VLAN, protocol-based VLAN, IP subnet-based VLAN

Management VLAN

Private VLAN with promiscuous, isolated, and community port

Private VLAN Edge (PVE), also known as protected ports, with multiple uplinks Guest VLAN, unauthenticated VLAN

Dynamic VLAN assignment via RADIUS server along with 802.1X client authentication Customer premises equipment (CPE) VLAN

Auto surveillance VLAN (ASV)

Voice VLAN

Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers networkwide zero-touch deployment of voice endpoints and call control devices

Multicast TV VLAN

Multicast TV VLAN allows the single multicast VLAN to be shared in the network while subscribers remain in separate VLANs. This feature is also known as Multicast VLAN Registration (MVR)

VLAN translation

Support for VLAN one-to-one mapping, in which customer VLANs (C-VLANs) on an edge interface are mapped to service provider VLANs (S-VLANs), and the original C-VLAN tags are replaced by the specified S-VLAN

Q-in-Q

VLANs transparently cross a service provider network while isolating traffic among customers

Selective Q-in-Q

Selective Q-in-Q is an enhancement to the basic Q-in-Q feature and provides, per edge interface, multiple mappings of different C-VLANs to separate S-VLANs

Selective Q-in-Q also allows configuring of the Ethertype (Tag Protocol Identifier [TPID]) of the S-VLAN tag

Layer 2 protocol tunneling over Q-in-Q is also supported

Generic VLAN Registration Protocol (GVRP)/Generic Attribute Registration Protocol (GARP)

GVRP and GARP enable automatic propagation and configuration of VLANs in a bridged domain

Unidirectional Link

UDLD monitors physical connections to detect unidirectional links caused by incorrect

Detection (UDLD)

wiring or cable/port faults to prevent forwarding loops and blackholing of traffic in switched networks

DHCP relay at Layer 2

Relay of DHCP traffic to a DHCP server in a different VLAN; works with DHCP Option 82

Internet Group Management Protocol (IGMP) versions 1, 2, and 3 snooping

IGMP limits bandwidth-intensive multicast traffic to only the requesters; it supports 2000 multicast groups (source-specific multicasting is also supported)

IGMP querier

IGMP querier is used to support a Layer 2 multicast domain of snooping switches in the absence of a multicast router

IGMP proxy

The IGMP proxy provides a mechanism for multicast forwarding based on IGMP membership information without the need for more complicated multicast routing protocols

Head-of-Line (HOL) blocking

HOL blocking prevention

Loopback detection

Loopback detection provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of STP

Layer 3

IPv4 routing

Wire-speed routing of IPv4 packets

Up to 990 static routes and up to 128 IP interfaces

IPv6 routing

Wire-speed routing of IPv6 packets

Layer 3 interface

Configuration of a Layer 3 interface on a physical port, LAG, VLAN interface, or loopback interface

Classless Interdomain Routing (CIDR)

Support for CIDR

Routing Information Protocol (RIP) v2

Support for RIP v2 for dynamic routing

Policy-Based Routing (PBR)

Flexible routing control to direct packets to a different next hop based on an IPv4 or IPv6 Access Control List (ACL)

DHCP server

Switch functions as an IPv4 DHCP server, serving IP addresses for multiple DHCP pools or scopes

Support for DHCP options

DHCP relay at Layer 3

Relay of DHCP traffic across IP domains

User Datagram Protocol (UDP) relay

Relay of broadcast information across Layer 3 domains for application discovery or relaying of Bootstrap Protocol (BOOTP)/DHCP packets

Stacking

Hardware stacking

Up to 8 switches in a stack. Up to 200 ports managed as a single system with hardware failover

Stacking is supported on the following models:

●  Family 1: C1300-16P-4X, C1300-24T-4X, C1300-24P-4X, C1300-24FP-4X, C1300-48T-4X, C1300-48P-4X, C1300-48FP-4X, C1300-8MGP-2X, C1300-24MGP-4X, C1300-48MGP-4X
●  Family 2: C1300-12XT-2X, C1300-12XS, C1300-16XTS, C1300-24XS, C1300-24XT, C1300-24XTS
●  PIDs from the same Family can be stacked together. Cross-stacking between Families is not supported.

High availability

Fast stack failover delivers minimal traffic loss. Support for LAG across multiple units in a stack

Plug-and-play stacking configuration/management

Active/standby for resilient stack control Auto-numbering

Hot swap of units in stack

Ring and chain stacking options, auto stacking port speed, flexible stacking port options

High-speed stack interconnects

Cost-effective high-speed 10 Gigabit Ethernet fiber interfaces

Security

Secure Shell (SSH) Protocol

SSH is a secure replacement for Telnet traffic. Secure Copy Protocol (SCP) also uses SSH. SSH v1 and v2 are supported

Secure Sockets Layer (SSL)

SSL support: Encrypts all HTTPS traffic, allowing highly secure access to the browser-based management GUI in the switch

IEEE 802.1X (authenticator role)

802.1X: RADIUS authentication and accounting, MD5 hash, guest VLAN, unauthenticated VLAN, single/multiple host mode, and single/multiple sessions

Supports time-based 802.1X, dynamic VLAN assignment, and MAC authentication

IEEE 802.1X supplicant

A switch can be configured to act as a supplicant to another switch. This enables extended secure access in areas outside the wiring closet (such as conference rooms)

Web-based authentication

Web-based authentication provides network admission control through a web browser to any host devices and operating systems

STP Bridge Protocol Data Unit (BPDU) Guard

A security mechanism to protect the network from invalid configurations. A port enabled for BPDU Guard is shut down if a BPDU message is received on that port. This avoids accidental topology loops

STP Root Guard

Prevents edge devices not in the network administrator’s control from becoming STP root nodes

STP loopback guard

Provides additional protection against Layer 2 forwarding loops (STP loops)

DHCP snooping

Filters out DHCP messages with unregistered IP addresses and/or from unexpected or untrusted interfaces. This prevents rogue devices from behaving as DHCP servers

IP Source Guard (IPSG)

When IPSG is enabled at a port, the switch filters out IP packets received from the port if the source IP addresses of the packets have not been statically configured or dynamically learned from DHCP snooping. This prevents IP address spoofing

Dynamic ARP Inspection (DAI)

The switch discards ARP packets from a port if there are no static or dynamic IP/MAC bindings or if there is a discrepancy between the source or destination addresses in the ARP packet. This prevents man-in-the-middle attacks

IP/MAC/port binding (IPMB)

The preceding features (DHCP snooping, IPSG, and DAI) work together to prevent Denial-of-Service (DoS) attacks in the network, thereby increasing network availability

Secure Core Technology (SCT)

Makes sure that the switch will receive and process management and protocol traffic no matter how much traffic is received

Secure Sensitive Data (SSD)

Description

Feature

Description

Performance

Switching capacity and forwarding rate

All switches are wire speed and nonblocking

Model

Capacity in Millions of PacketsPerSecond(mpps) (64-byte packets)

Switching capacity in Gigabitspersecond(Gbps)

C1300-8FP-2G

14.88

20.0

C1300-8T-E-2G

14.88

20.0

C1300-8P-E-2G

14.88

20.0

C1300-16T-2G

26.78

36.0

C1300-16P-2G

26.78

36.0

C1300-16FP-2G

26.78

36.0

C1300-24T-4G

41.66

56.0

C1300-24P-4G

41.66

56.0

C1300-24FP-4G

41.66

56.0

C1300-48T-4G

77.38

104.0

C1300-48P-4G

77.38

104.0

C1300-48FP-4G

77.38

104.0

C1300-16P-4X

83.32

112.0

C1300-24T-4X

95.23

128.0

C1300-24P-4X

95.23

128.0

C1300-24FP-4X

95.23

128.0

C1300-48T-4X

130.94

176.0

C1300-48P-4X

130.94

176.0

C1300-48FP-4X

130.94

176.0

C1300-8MGP-2X

41.66

56

C1300-24MGP-4X

113.08

152

C1300-48MGP-4X

166.65

224

C1300-12XT-2X

208.33

280

C1300-12XS

178.57

240

C1300-16XTS

238.1

320

C1300-24XS

357.14

480

C1300-24XT

357.14

480

C1300-24XTS

357.12

480

Layer 2 switching

Spanning Tree Protocol

Standard 802.1d Spanning Tree support

Fast convergence using 802.1w (Rapid Spanning Tree [RSTP]), enabled by default Multiple Spanning Tree instances using 802.1s (MSTP); 8 instances are supported

Per-VLAN Spanning Tree Plus (PVST+) and Rapid PVST+ (RPVST+); 126 instances are supported

Port grouping/link aggregation

●  Support for IEEE 802.3ad Link Aggregation Control Protocol (LACP)
●  Up to 8 groups
●  Up to 8 ports per group with 16 candidate ports for each (dynamic) 802.3ad link aggregation

VLAN

Support for up to 4093 VLANs simultaneously

Port-based and 802.1Q tag-based VLANs, MAC-based VLAN, protocol-based VLAN, IP subnet-based VLAN

Management VLAN

Private VLAN with promiscuous, isolated, and community port

Private VLAN Edge (PVE), also known as protected ports, with multiple uplinks Guest VLAN, unauthenticated VLAN

Dynamic VLAN assignment via RADIUS server along with 802.1X client authentication Customer premises equipment (CPE) VLAN

Auto surveillance VLAN (ASV)

Voice VLAN

Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers networkwide zero-touch deployment of voice endpoints and call control devices

Multicast TV VLAN

Multicast TV VLAN allows the single multicast VLAN to be shared in the network while subscribers remain in separate VLANs. This feature is also known as Multicast VLAN Registration (MVR)

VLAN translation

Support for VLAN one-to-one mapping, in which customer VLANs (C-VLANs) on an edge interface are mapped to service provider VLANs (S-VLANs), and the original C-VLAN tags are replaced by the specified S-VLAN

Q-in-Q

VLANs transparently cross a service provider network while isolating traffic among customers

Selective Q-in-Q

Selective Q-in-Q is an enhancement to the basic Q-in-Q feature and provides, per edge interface, multiple mappings of different C-VLANs to separate S-VLANs

Selective Q-in-Q also allows configuring of the Ethertype (Tag Protocol Identifier [TPID]) of the S-VLAN tag

Layer 2 protocol tunneling over Q-in-Q is also supported

Generic VLAN Registration Protocol (GVRP)/Generic Attribute Registration Protocol (GARP)

GVRP and GARP enable automatic propagation and configuration of VLANs in a bridged domain

Unidirectional Link

UDLD monitors physical connections to detect unidirectional links caused by incorrect

Detection (UDLD)

wiring or cable/port faults to prevent forwarding loops and blackholing of traffic in switched networks

DHCP relay at Layer 2

Relay of DHCP traffic to a DHCP server in a different VLAN; works with DHCP Option 82

Internet Group Management Protocol (IGMP) versions 1, 2, and 3 snooping

IGMP limits bandwidth-intensive multicast traffic to only the requesters; it supports 2000 multicast groups (source-specific multicasting is also supported)

IGMP querier

IGMP querier is used to support a Layer 2 multicast domain of snooping switches in the absence of a multicast router

IGMP proxy

The IGMP proxy provides a mechanism for multicast forwarding based on IGMP membership information without the need for more complicated multicast routing protocols

Head-of-Line (HOL) blocking

HOL blocking prevention

Loopback detection

Loopback detection provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of STP

Layer 3

IPv4 routing

Wire-speed routing of IPv4 packets

Up to 990 static routes and up to 128 IP interfaces

IPv6 routing

Wire-speed routing of IPv6 packets

Layer 3 interface

Configuration of a Layer 3 interface on a physical port, LAG, VLAN interface, or loopback interface

Classless Interdomain Routing (CIDR)

Support for CIDR

Routing Information Protocol (RIP) v2

Support for RIP v2 for dynamic routing

Policy-Based Routing (PBR)

Flexible routing control to direct packets to a different next hop based on an IPv4 or IPv6 Access Control List (ACL)

DHCP server

Switch functions as an IPv4 DHCP server, serving IP addresses for multiple DHCP pools or scopes

Support for DHCP options

DHCP relay at Layer 3

Relay of DHCP traffic across IP domains

User Datagram Protocol (UDP) relay

Relay of broadcast information across Layer 3 domains for application discovery or relaying of Bootstrap Protocol (BOOTP)/DHCP packets

Stacking

Hardware stacking

Up to 8 switches in a stack. Up to 200 ports managed as a single system with hardware failover

Stacking is supported on the following models:

●  Family 1: C1300-16P-4X, C1300-24T-4X, C1300-24P-4X, C1300-24FP-4X, C1300-48T-4X, C1300-48P-4X, C1300-48FP-4X, C1300-8MGP-2X, C1300-24MGP-4X, C1300-48MGP-4X
●  Family 2: C1300-12XT-2X, C1300-12XS, C1300-16XTS, C1300-24XS, C1300-24XT, C1300-24XTS
●  PIDs from the same Family can be stacked together. Cross-stacking between Families is not supported.

High availability

Fast stack failover delivers minimal traffic loss. Support for LAG across multiple units in a stack

Plug-and-play stacking configuration/management

Active/standby for resilient stack control Auto-numbering

Hot swap of units in stack

Ring and chain stacking options, auto stacking port speed, flexible stacking port options

High-speed stack interconnects

Cost-effective high-speed 10 Gigabit Ethernet fiber interfaces

Security

Secure Shell (SSH) Protocol

SSH is a secure replacement for Telnet traffic. Secure Copy Protocol (SCP) also uses SSH. SSH v1 and v2 are supported

Secure Sockets Layer (SSL)

SSL support: Encrypts all HTTPS traffic, allowing highly secure access to the browser-based management GUI in the switch

IEEE 802.1X (authenticator role)

802.1X: RADIUS authentication and accounting, MD5 hash, guest VLAN, unauthenticated VLAN, single/multiple host mode, and single/multiple sessions

Supports time-based 802.1X, dynamic VLAN assignment, and MAC authentication

IEEE 802.1X supplicant

A switch can be configured to act as a supplicant to another switch. This enables extended secure access in areas outside the wiring closet (such as conference rooms)

Web-based authentication

Web-based authentication provides network admission control through a web browser to any host devices and operating systems

STP Bridge Protocol Data Unit (BPDU) Guard

A security mechanism to protect the network from invalid configurations. A port enabled for BPDU Guard is shut down if a BPDU message is received on that port. This avoids accidental topology loops

STP Root Guard

Prevents edge devices not in the network administrator’s control from becoming STP root nodes

STP loopback guard

Provides additional protection against Layer 2 forwarding loops (STP loops)

DHCP snooping

Filters out DHCP messages with unregistered IP addresses and/or from unexpected or untrusted interfaces. This prevents rogue devices from behaving as DHCP servers

IP Source Guard (IPSG)

When IPSG is enabled at a port, the switch filters out IP packets received from the port if the source IP addresses of the packets have not been statically configured or dynamically learned from DHCP snooping. This prevents IP address spoofing

Dynamic ARP Inspection (DAI)

The switch discards ARP packets from a port if there are no static or dynamic IP/MAC bindings or if there is a discrepancy between the source or destination addresses in the ARP packet. This prevents man-in-the-middle attacks

IP/MAC/port binding (IPMB)

The preceding features (DHCP snooping, IPSG, and DAI) work together to prevent Denial-of-Service (DoS) attacks in the network, thereby increasing network availability

Secure Core Technology (SCT)

Makes sure that the switch will receive and process management and protocol traffic no matter how much traffic is received

Secure Sensitive Data (SSD)