Your Switch in Numbers

The DMS-1100-10TS features eight 2.5 Gigabit PoE ports and two dedicated SFP+ Ports, offering an impressive 80 Gbps total switching capacity. It is perfect for a deployment of Wave 2 Access Points, while the uplink ports provide more than enough bandwidth when accessing the larger local network.


8


Gigabit Ports

80 Gbps


Switching Capacity

2


SFP+ Uplinks

A Bridge Between Two Generations

The DMS-1100-10TS is a future-ready solution, designed for the upcoming years of connectivity. As more businesses replace older Ethernet with 2.5G to support increasingly powerful Access Points, you can rest assured this switch will keep on serving you well.

It is also a big deal for your CAPEX thanks to backwards compatibility. It can push Cat 5e cabling to its limit, allowing 2.5 Gigabit connectivity over it, so you get the absolute most out of your existing cabling.

Easy Setup & Effortless Management

Allay your deployment fears. With the free D-Link DNA app, first time setup is a breeze, with your device up and going in minutes.

Fast Data, Fast Business

When data is running smoothly, so does your business. The DMS-1100 Series is packed with Layer 2 features for a more efficient network and rapid troubleshooting abilities.


Spanning Tree Protocol

Effectively streamlines pathways between complex networks that include several switches, maintaining speedy and safe transmission of data

Loopback Detection

Data being transmitted and then erroneously retransmitted continuously can paralyze the network, but this feature keeps a watchful eye out, stopping potential loops in their tracks.

Port Mirroring

Observe and monitor network traffic, with only the most minimal burden on the network.

Even Safer Surveillance

If you have surveillance cameras or related devices attached to your network, putting them onto their own VLAN keeps surveillance footage running seamlessly. The DMS-1100 Series intelligently sorts surveillance traffic automatically into a separate VLAN. It can also head off a variety of malicious attacks by isolating sensitive areas of the network.