Other Sellers on Amazon
+ FREE Delivery
+ FREE Delivery
+ FREE Delivery
TP-Link 5-Port Gigabit Ethernet Easy Smart Switch (TL-SG105E)
- 5-Gigabit ports provide instant large file transfers
- 15K Jumbo frame improves performance of large data transfers
- Effective network monitoring via Port Mirroring, Loop Prevention and Cable Diagnostics Abundant VLAN features improve network security via traffic segmentation
- IGMP Snooping optimizes multicast applications Port and tag-based QoS enable smooth latency-sensitive traffic
- TP-Link - World's No. 1 Provider of WLAN Products within last 6 years LEADING SUPPORT - Industry leading 3-year warranty and 24/7 technical support
Frequently bought together
Have a question?
Find answers in product info, Q&As, reviews
Please make sure that you've entered a valid question. You can edit your question or post anyway.
Please enter a question.
From the manufacturer
Auto MDI/MDI-X crossover on all ports eliminate the need for crossover cables or uplink ports. Auto-negotiation on each port detects the link speed of a network device and intelligently adjusts settings for compatibility and optimal performance.
The interior components of TL-SG105E are protected by high-quality metal casing to ensure a long product life. Having passed an array of stringent reliability tests, TL-SG105E delivers switching performance you can depend on. Its compact size makes it ideal for deployment on desktops or work benches.
Features the latest innovative energy-efficient technologies that can greatly expand your network capacity with much less power. It automatically adjusts power consumption according to the link status and cable length to limit the carbon footprint of your network.
Customers who viewed this item also viewed
Customers who bought this item also bought
Review this product
3 customer reviews
There was a problem filtering reviews right now. Please try again later.
Most helpful customer reviews on Amazon.com
IMPORTANT: This product has a version 1 and a version 2. The major difference (and possibly the only difference) is that V1 in only configurable via a software utility you have to install from disc, whereas, V2 is configurable via a web GUI which for me was a MAJOR plus.
I received the V2 product thankfully. I didn't do anything special when ordering, I'm guessing the supplier flushed out all the V1s. From un-boxing to walking away, it took me all of 15 min. And that's only because I geeked out on looking through all the cool settings. You could be up in running in less than 10 if you're used to this kind of equipment. My initial experience with this unit has been fantastic. I would recommend this to anyone no problem.
Firmware Version: 1.0.2 Build 20160526 Rel.34615
I bought this switch specifically for it's VLAN functionality and while I don't often write reviews for many products, I feel obligated to warn other more "network savvy" customers to stay away from this item.
I must echo the review by "A Customer" on July 13, 2016: "Regardless of PVID or 802.1Q VLANs, every port on this switch passes untagged traffic on VLAN 1. Even if you set another VLAN to be untagged on a given port, you cannot then remove VLAN 1 from that port."
This is a huge issue because if you wish to segment sections of VLANs using a "router on a stick" implementation, you can set the PVID on a port to be a VLAN other than VLAN1, but then broadcasts received on another port in VLAN1 are allowed to propagate out of all ports.
Another Amazon reviewer, putzomaticon, sheds some light on this issue when he wrote TP-Link support on May 28, 2015: "I contacted TP-Link support regarding this issue and they basically told me they implemented these features this way on purpose because this model switch is apparently targeted at end users that want these features, but don't know anything about them. Here is a quote from their response: "For your first advice about no management vlan of TL-SG1016DE,it is not the oversight, it is due to consideration of small business environment, where most users do not have enough network knowledge,they know little about the concept of "management vlan" and they do not have so much concern about the security problem caused.""
Network admins in a small business environments suddenly don't care about network security? This is a huge security concern because you're unable to adjust the management VLAN and the management IP address is accessible for every VLAN on the switch through VLAN1 regardless of the configuration. Truly a horrible and insecure implementation.
Of concern - the switch does not refuse traffic that is inappropriately tagged or arriving through an ineligible switch port. There is no real security afforded through traffic isolation and the management IP address can be reached from any port regardless of what VLAN configuration is in effect.
Example: management IP (default): 192.168.1.1/24 on VLAN 100, with VLAN 100 only enabled on switch port 1. Ports 2-4 are VLAN 200 "LAN" using 10.0.0.1/24. A malicious user on port 2-4 can configure their IP to 192.168.1.2/24 and reach the switch's admin logon page.
Specifically, the switch IP that hosts the http tcp/80 web interface can not be turn off or restricted to any specific ports or vlans. That IP exists on all ports and vlans regardless of how you segment everything else. This opens up an attack vector that could easily defeat you network segmentation. Since mac addresses are vendor specific, an attacker can just sweep RFC-1918 address space to discover TP link devices then spoof scan for port 80 to discover targets. It wouldn't take too long to brute force the authentication and add themselves to the money vlan. It took me about an hour to run a POC with off the shelf network tools. I'm guessing this is something a motivated attacker would have in their toolbelt.
That said, it would probably take a motivated attacker or someone skilled and bored with access to a public network.
EDIT: The best protection you could add right away would be to use a randomized 16 char password and username. Unfortunately they only allow letters, numbers, digits and underscore up to 16 chars in each field, but randomizing both should at least make the brute force attack more difficult.