KATEGORIE
12213 Kč
cena s DPH
Zyxel USG FLEX 50 H, 5 Gigabit user-definable ports, 1*USB with 1 YR Entry Defense Pack
262 Kč
cena s DPH
Univerzální stripovací nástroj pro síťové, telefonní a koaxiální kabely
UTP/STP/FTP, telefonní kabely, ploché kabely, RG59/6, RG11/7
20335 Kč
cena s DPH
Cisco Catalyst switch C1300-48P-4G
CISCO REFRESH jsou repasované produkty, které společnost CISCO dodává s certifikací kvality, zárukou a servisní podporou odpovídající ekvivalentnímu novému produktu
Cisco Catalyst řady 1300 jsou managovatelné switche Gigabit Ethernet Layer 3 podnikové třídy určené pro malé a střední podniky a pobočky. Tyto jednoduché, flexibilní a bezpečné switche jsou ideální pro nasazení mimo rozvodnou skříň. Řada Catalyst 1300 pracuje na přizpůsobeném softwaru operačního systému Linux s intuitivním grafickým rozhraním, který zjednodušuje nastavení sítě a pokročilými funkcemi, které urychlují digitální transformaci, zatímco všudypřítomné zabezpečení chrání kritické obchodní transakce. Přepínače řady 1300 poskytují ideální kombinaci cenové dostupnosti a možností pro malé a střední podniky a pomáhají vám vytvořit efektivnější a lépe propojenou pracovní sílu.
Stránky produktu: C1300-48P-4G
Performance Switching capacity and forwarding rate (All switches are wire-speed and nonblocking)
Capacity in millions of packets per second (mpps) (64-byte packets) 77.38
Switching capacity in gigabits per second (Gbps) 104.0
Layer 2 switching Spanning Tree Protocol (STP) Standard 802.1d spanning tree support
Fast convergence using 802.1w (Rapid Spanning Tree Protocol [RSTP]), enabled by default
Multiple spanning tree instances using 802.1s (MSTP); 8 instances are supported
Per-VLAN Spanning Tree Plus (PVST+); 126 instances are supported
Rapid PVST+ (RPVST+); 126 instances are supported
Port grouping/link aggregation Support for IEEE 802.3ad Link Aggregation Control Protocol (LACP)
Up to 8 groups
Up to 8 ports per group with 16 candidate ports for each (dynamic) 802.3ad link aggregation
VLAN Support for up to 4093 VLANs simultaneously
Port-based and 802.1Q tag-based VLANs, MAC-based VLAN, protocol-based VLAN, IP subnet-based VLAN
Management VLAN
Private VLAN with promiscuous, isolated, and community port
Private VLAN Edge (PVE), also known as protected ports, with multiple uplinks Guest VLAN, unauthenticated VLAN
Dynamic VLAN assignment via RADIUS server along with 802.1X client authentication Customer premises equipment (CPE) VLAN
Auto surveillance VLAN (ASV)
Voice VLAN Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers networkwide zero-touch deployment of voice endpoints and call control devices
Multicast TV VLAN Multicast TV VLAN allows the single multicast VLAN to be shared in the network while subscribers remain in separate VLANs. This feature is also known as Multicast VLAN Registration (MVR)
VLAN translation Support for VLAN one-to-one mapping, in which customer VLANs (C-VLANs) on an edge interface are mapped to service provider VLANs (S-VLANs), and the original C-VLAN tags are replaced by the specified S-VLAN
Q-in-Q VLANs transparently cross a service provider network while isolating traffic among customers
Selective Q-in-Q Selective Q-in-Q is an enhancement to the basic Q-in-Q feature and provides, per edge interface, multiple mappings of different C-VLANs to separate S-VLANs
Selective Q-in-Q also allows configuring of the Ethertype (Tag Protocol Identifier [TPID]) of the S-VLAN tag
Layer 2 protocol tunneling over Q-in-Q is also supported
Generic VLAN Registration Protocol (GVRP)/Generic Attribute Registration Protocol (GARP) GVRP and GARP enable automatic propagation and configuration of VLANs in a bridged domain
Unidirectional Link UDLD monitors physical connections to detect unidirectional links caused by incorrect
Detection (UDLD) wiring or cable/port faults to prevent forwarding loops and blackholing of traffic in switched networks
DHCP relay at Layer 2 Relay of DHCP traffic to a DHCP server in a different VLAN; works with DHCP Option 82
Internet Group Management Protocol (IGMP) versions 1, 2, and 3 snooping IGMP limits bandwidth-intensive multicast traffic to only the requesters; it supports 2000 multicast groups (source-specific multicasting is also supported)
IGMP querier IGMP querier is used to support a Layer 2 multicast domain of snooping switches in the absence of a multicast router
IGMP proxy The IGMP proxy provides a mechanism for multicast forwarding based on IGMP membership information without the need for more complicated multicast routing protocols
Head-of-Line (HOL) blocking HOL blocking prevention
Loopback detection Loopback detection provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of STP
Layer 3 IPv4 routing Wire-speed routing of IPv4 packets
Up to 990 static routes and up to 128 IP interfaces
IPv6 routing Wire-speed routing of IPv6 packets
Layer 3 interface Configuration of a Layer 3 interface on a physical port, LAG, VLAN interface, or loopback interface
Classless Interdomain Routing (CIDR) Support for CIDR
Routing Information Protocol (RIP) v2 Support for RIP v2 for dynamic routing
Policy-Based Routing (PBR) Flexible routing control to direct packets to a different next hop based on an IPv4 or IPv6 Access Control List (ACL)
DHCP server Switch functions as an IPv4 DHCP server, serving IP addresses for multiple DHCP pools or scopes
Support for DHCP options
DHCP relay at Layer 3 Relay of DHCP traffic across IP domains
User Datagram Protocol (UDP) relay Relay of broadcast information across Layer 3 domains for application discovery or relaying of Bootstrap Protocol (BOOTP)/DHCP packets
Security Secure Shell (SSH) Protocol SSH is a secure replacement for Telnet traffic. Secure Copy Protocol (SCP) also uses SSH. SSH v1 and v2 are supported
Secure Sockets Layer (SSL) SSL support: Encrypts all HTTPS traffic, allowing highly secure access to the browser-based management GUI in the switch
IEEE 802.1X (authenticator role) 802.1X: RADIUS authentication and accounting, MD5 hash, guest VLAN, unauthenticated VLAN, single/multiple host mode, and single/multiple sessions
Supports time-based 802.1X, dynamic VLAN assignment, and MAC authentication
IEEE 802.1X supplicant A switch can be configured to act as a supplicant to another switch. This enables extended secure access in areas outside the wiring closet (such as conference rooms)
Web-based authentication Web-based authentication provides network admission control through a web browser to any host devices and operating systems
STP Bridge Protocol Data Unit (BPDU) Guard A security mechanism to protect the network from invalid configurations. A port enabled for BPDU Guard is shut down if a BPDU message is received on that port. This avoids accidental topology loops
STP Root Guard Prevents edge devices not in the network administrator’s control from becoming STP root nodes
STP loopback guard Provides additional protection against Layer 2 forwarding loops (STP loops)
DHCP snooping Filters out DHCP messages with unregistered IP addresses and/or from unexpected or untrusted interfaces. This prevents rogue devices from behaving as DHCP servers
IP Source Guard (IPSG) When IPSG is enabled at a port, the switch filters out IP packets received from the port if the source IP addresses of the packets have not been statically configured or dynamically learned from DHCP snooping. This prevents IP address spoofing
Dynamic ARP Inspection (DAI) The switch discards ARP packets from a port if there are no static or dynamic IP/MAC bindings or if there is a discrepancy between the source or destination addresses in the ARP packet. This prevents man-in-the-middle attacks
IP/MAC/port binding (IPMB) The preceding features (DHCP snooping, IPSG, and DAI) work together to prevent Den...
6497 Kč
cena s DPH
Řízený L2+ switch, Plug and Play design, management přes Omada SDN, celková kapacita až 160 GB/s, rychlost směrování až 119 Mpps, 8x SFP+, 1x RJ-45 + microUSB, 5rychlostní připojení 0,1 / 1 / 2,5 / 5 / 10 GB/s, Auto MDI/MDI-X a Auto-Negotiation. Černá.
362 Kč
cena s DPH
Teltonika 058R-00229 interní napájecí kabel 2 m
Barva: Černá
Pohlaví konektoru 1: Samec
Délka kabelu: 2 m
Formát konektoru 1: Přímý
Formát konektoru 2: Přímý
2098 Kč
cena s DPH
PODSTAVEC TRITON S FILTREM RAX-PO-X88-XN, v rozměrech š 800 x h 800 mm je plně univerzální, tj. použitelný pro všechny typy stojanových rozvaděčů. Konstrukci tvoří dva podélné boční díly s prostupem pro kabely a s vylamovacími záslepkami, které odpovíd...
141 Kč
cena s DPH
ExtraLink PATCHCORD LC/UPC-LC/UPC SM DUPLEX 3,0MM 5M
748 Kč
cena s DPH
TP-Link EC120-F5; EC120-F5 přichází s novou generací standardu Wi-Fi 802.11ac , jež je 3x rychlejší než rychlost bezdrátového standardu 802.11n, se kterým je zpětně kompatibilní. Podporuje st...
131 Kč
cena s DPH
Konektor RJ12 (6p6c), 3µm, licna(lanko) - 100 ks
Balení: 100 ks
Technické informace
Konektor:
RJ12
Piny:
6p6c
Zlacení:
3 µm
2063 Kč
cena s DPH
Solarix HT-2008AR; Tyto kleště lze použít ke krimpování většiny konektorů, které se v souvislosti se strukturovanou kabeláží používají. Jsou vyrobeny z kvalitního materiálu, který zajišťuje jejich dlouhou životnost a...
1498 Kč
cena s DPH
BAZAR - TP-Link Tapo C225 - poškozený obal
Domácí bezpečnostní Wi-Fi kamera
Režim fyzického soukromí - Udržujte soukromí s čočkou blokovanou krytem, když je nastaven režim fyzického soukromí.
Inteligentní detekce a oznámení AI - Inteligentní AI identifikuje lidi, domácí mazlíčky a vozidla a zároveň rozpozná abnormální zvuky a podle potřeby upozorní uživatele.
Pan and Tilt - Poskytuje 360° horizontální zorné pole.
Chytré sledování - Sleduje objekt, přičemž jej udržuje v zorném poli fotoaparátu.
Senzor světla - Vysoce citlivý senzor světla zachycuje snímky vyšší kvality i za špatných světelných podmínek.
Zvukový a světelný alarm - Spusťte světelné a zvukové efekty, které zastraší nechtěné návštěvníky.
Obousměrný zvuk - Umožňuje komunikaci prostřednictvím vestavěného mikrofonu a reproduktoru.
Snadné nastavení - Podle pokynů v aplikaci snadno nastavíte během několika minut.
Stránky produktu: https://ww w.tp-link.com/cz/home-networking/cloud-camera/tapo-c225/
Technické specifikace
CAMERA
Image Sensor
1/3“
Resolution
2K QHD (2560 × 1440 px)
Lens
F/NO: 1.6±5%; Focal Length: 4mm±5%
Night Vision
Night Vision
View Range
360° Horizontal, 149° Vertical
NETWORK
Security
128 bit AES encryption with SSL/TLS
Wi-Fi Protocol
IEEE 802.11b/g/n, 2.4 GHz
Protocol
TCP/IP, DHCP, ICMP, DNS, NTP, HTTPS, TCP, UDP, ONVIF
Frequency
2.4 GHz
Wireless Security
WPA/WPA2-PSK
ACTIVITY NOTIFICATIONS
Input Trigger
Motion Detection, Person Detection, Line-Crossing Detection, Camera Tampering, Baby Crying Detection, Vehicle Detection, Pet Detection, Cat Meows Detection, Dog Bark Detection, Glass Break Detection, Smoke Alarm Detection
Output Notification
Notification, Snapshot(Tapo Care).
VIDEO
Video Compression
H.264
Frame Rate
2560×1440@15fps
Video Streaming
2K QHD
Audio Compression
G.711
AUDIO
Audio Communication
two-way audio
Audio Input & Output:
Built-in microphone and speaker
34734 Kč
cena s DPH
Cisco switch CBS350-48P-4G-EU
Řízené switche řady Cisco Business 350 jsou spolehlivými stavebními prvky pro sítě malých firem. Díky intuitivnímu ovládacímu panelu, pokročilým funkcím a všudypřítomnému zabezpečení urychlují spravované switche řady Cisco Business 350 vaši digitální transformaci.
Záruka platná do End of Support 31. 10. 2029.
Oznámení End of Life pro CISCO CBS350
Stránky produktu: CBS350-48P-4G-EU
Quick start guide: Quick start guide
Switching capacity and forwarding rate (All switches are wire speed and nonblocking) Capacity in Millions of Packets per Second (mpps) (64-byte packets) 77,38
Switching Capacity in Gigabits per Second (Gbps) 104
Layer 2 switching Spanning Tree Protocol (STP) Standard 802.1d Spanning Tree support
Fast convergence using 802.1w (Rapid Spanning Tree [RSTP]), enabled by default
Multiple Spanning Tree instances using 802.1s (MSTP); 8 instances are supported
Per-VLAN Spanning Tree Plus (PVST+) and Rapid PVST+ (RPVST+); 126 instances are supported
Port grouping/link aggregation Support for IEEE 802.3ad Link Aggregation Control Protocol (LACP)
Up to 8 groups
Up to 8 ports per group with 16 candidate ports for each (dynamic) 802.3ad link aggregation
VLAN Support for up to 4,094 VLANs simultaneously
Port-based and 802.1Q tag-based VLANs; MAC-based VLAN; protocol-based VLAN; IP subnet-based VLAN
Management VLAN
Private VLAN with promiscuous, isolated, and community port
Private VLAN Edge (PVE), also known as protected ports, with multiple uplinks
Guest VLAN, unauthenticated VLAN
Dynamic VLAN assignment via RADIUS server along with 802.1x client authentication
CPE VLAN
Voice VLAN Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers network wide zero-touch deployment of voice endpoints and call control devices
Multicast TV VLAN Multicast TV VLAN allows the single multicast VLAN to be shared in the network while subscribers remain in separate VLANs. This feature is also known as Multicast VLAN Registration (MVR)
VLAN Translation Support for VLAN One-to-One Mapping. In VLAN One-to-One Mapping, on an edge interface customer VLANs (C-VLANs) are mapped to service provider VLANs (S-VLANs) and the original C-VLAN tags are replaced by the specified S-VLAN
Q-in-Q VLANs transparently cross a service provider network while isolating traffic among customers
Selective Q-in-Q Selective Q-in-Q is an enhancement to the basic Q-in-Q feature and provides, per edge interface, multiple mappings of different C-VLANs to separate S-VLANs
Selective Q-in-Q also allows configuring of Ethertype (Tag Protocol Identifier [TPID]) of the S-VLAN tag
Layer 2 protocol tunneling over Q-in-Q is also supported
Generic VLAN Registration Protocol (GVRP)/Generic Attribute Registration Protocol (GARP) Generic VLAN Registration Protocol (GVRP) and Generic Attribute Registration Protocol (GARP) enable automatic propagation and configuration of VLANs in a bridged domain
Unidirectional Link Detection (UDLD) UDLD monitors physical connection to detect unidirectional links caused by incorrect wiring or cable/port faults to prevent forwarding loops and black holing of traffic in switched networks
Dynamic Host Configuration Protocol (DHCP) Relay at Layer 2 Relay of DHCP traffic to DHCP server in different VLAN; works with DHCP Option 82
Internet Group Management Protocol (IGMP) versions 1, 2, and 3 snooping IGMP limits bandwidth-intensive multicast traffic to only the requesters; supports 2K multicast groups (source-specific multicasting is also supported)
IGMP Querier IGMP querier is used to support a Layer 2 multicast domain of snooping switches in the absence of a multicast router
IGMP proxy The IGMP proxy provides a mechanism for multicast forwarding based on IGMP membership information without the need for more complicated multicast routing protocols.
Head-of-Line (HOL) blocking HOL blocking prevention
Loopback Detection Loopback detection provides protection against loops by transmitting loop protocol packets out of ports on which loop protection has been enabled. It operates independently of STP
Layer 3 IPv4 routing Wirespeed routing of IPv4 packets
Up to 990 static routes and up to 128 IP interfaces
IPv6 routing Wirespeed routing of IPv6 packets
Layer 3 Interface Configuration of Layer 3 interface on physical port, Link Aggregation (LAG), VLAN interface, or loopback interface
Classless Interdomain Routing (CIDR) Support for classless interdomain routing
RIP v2 Support for Routing Information Protocol version 2 for dynamic routing
Policy-Based Routing (PBR) Flexible routing control to direct packets to different next hop based on IPv4 or IPv6 Access Control List (ACL)
DHCP Server Switch functions as an IPv4 DHCP server serving IP addresses for multiple DHCP pools/scopes
Support for DHCP options
DHCP relay at Layer 3 Relay of DHCP traffic across IP domains
User Datagram Protocol (UDP) relay Relay of broadcast information across Layer 3 domains for application discovery or relaying of Bootstrap Protocol (BOOTP)/DHCP packets
Security ecure Shell (SSH) Protocol SSH is a secure replacement for Telnet traffic. Secure Copy Protocol (SCP) also uses SSH. SSH v1 and v2 are supported
Secure Sockets Layer (SSL) SSL support: Encrypts all HTTPS traffic, allowing highly secure access to the browser-based management GUI in the switch
IEEE 802.1X (Authenticator role) 802.1X: Remote Authentication Dial-In User Service (RADIUS) authentication and accounting, MD5 hash; guest VLAN; unauthenticated VLAN, single/multiple host mode and single/multiple sessions
Supports time-based 802.1X; dynamic VLAN assignment; MAC authentication
IEEE 802.1X supplicant A switch can be configured to act as a supplicant to another switch. This enables extended secure access in areas outside the wiring closet (such as conference rooms)
Web-based authentication Web-based authentication provides network admission control through web browser to any host devices and operating systems
STP Bridge Protocol Data Unit (BPDU) Guard A security mechanism to protect the network from invalid configurations. A port enabled for BPDU Guard is shut down if a BPDU message is received on that port. This avoids accidental topology loops
STP Root Guard This prevents edge devices not in the network administrator’s control from becoming Spanning Tree Protocol root nodes
STP loopback guard Provides additional protection against Layer 2 forwarding loops (STP loops)
DHCP snooping Filters out DHCP messages with unregistered IP addresses and/or from unexpected or untrusted interfaces. This prevents rogue devices from behaving as DHCP Servers.
IP Source Guard (IPSG) When IP Source Guard is enabled at a port, the switch filters out IP packets received from the port if the source IP addresses of the packets have not been statically configured or dynamically learned from DHCP snooping. This prevents IP address spoofing.
Dynamic ARP Inspection (DAI) The switch discards ARP packets from a port if there are no static or dynamic IP/MAC bindings or if there is a discrepancy between the source or destination addresses in the ARP packet. This prevents man-in-the-middle attacks.
IP/MAC/Port Binding (IPMB) The preceding features (DHCP Snooping, IP Source Guard, and Dynamic ARP Inspection) work together to prevent DOS attacks in the network, thereby increasing network availability
Secure Core Technology (SCT) Makes sure that the switch will receive and process management and protocol traffic no matter how much traffic is received
Secure Sensitive Data (SSD) A mechanism to manage sensitive data (such as passwo
484 Kč
cena s DPH
Ospel Aria RTV-Sat State Great Mat GPA-US/M/70
48075 Kč
cena s DPH
8-portový KVM přepínač, 17" LCD Display a klávesnice (102 kláves), lze dát do 19" racku, USB port pro sdílení USB periferie
8-Port Slideaway™ LCD KVMP Switch
The CL5708 Slideaway™ LCD KVMP Switch is a control unit that allows access to multiple comput
102 Kč
cena s DPH
ExtraLink PATCHCORD SC/APC-LC/UPC SM G.652D SIMPLEX 10M
4690 Kč
cena s DPH
Solarix Rozvádzač nástenný nitovaný SENSA 18U 400mm, dvere sklo, RAL 7035