When there might be a difference between the automatic generated specifications by the Ebay system, and the hand written/typed description, then please be aware that the only correct description is what's written by our selves here in the description.
Specifications above might be slightly different.
Thanks for your understanding.
CISCO CATALYST 3560 WS-C3560G-24TS-S 10/100/1000Mbps Switch
CATALYST 3560 Model
IEEE 802.1s IEEE 802.1w IEEE 802.1x IEEE 802.3ad IEEE 802.3af IEEE 802.3x full duplex on 10BASE-T, 100BASE-TX, and 1000BASE-T ports IEEE 802.1D Spanning Tree Protocol IEEE 802.1p CoS Prioritization IEEE 802.1Q VLAN IEEE 802.3 10BASE-T specification IEEE 802.3u 100BASE-TX specification IEEE 802.3ab 1000BASE-T specification IEEE 802.3z 1000BASE-X specification RMON I and II standards SNMPv1, SNMPv2c, and SNMPv3 Jumbo Frames
24 Ethernet 10/100/1000 ports and 4 SFP-based Gigabit Ethernet ports Speed
10/100/1000Mbps MAC Address Table
Up to 12,000 Buffer Memory
128 MB DRAM 32 MB Flash memory Security
IEEE 802.1x allows dynamic, port-based security, providing user authentication. IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific user regardless of where the user is connected. IEEE 802.1x with voice VLAN permits an IP phone to access the voice VLAN irrespective of the authorized or unauthorized state of the port. IEEE 802.1x and port security are provided to authenticate the port and manage network access for all MAC addresses, including those of the client. IEEE 802.1x with an ACL assignment allows for specific identity-based security policies regardless of where the user is connected. IEEE 802.1x with Guest VLAN allows guests without 802.1x clients to have limited network access on the guest VLAN. CISCO security VLAN ACLs (VACLs) on all VLANs prevent unauthorized data flows from being bridged within VLANs. CISCO standard and extended IP security router ACLs (RACLs) define security policies on routed interfaces for control- and data-plane traffic. Port-based ACLs (PACLs) for Layer 2 interfaces allow application of security policies on individual switch ports. Unicast MAC filtering prevents the forwarding of any type of packet with a matching MAC address. Unknown unicast and multicast port blocking allows tight control by filtering packets that the switch has not already learned how to forward. SSHv2, Kerberos, and SNMPv3 provide network security by encrypting administrator traffic during Telnet and SNMP sessions. SSHv2, Kerberos, and the cryptographic version of SNMPv3 require a special cryptographic software image because of U.S. export restrictions. Private VLAN provides security and isolation between switch ports, helping ensure that users cannot snoop on other users' traffic. Bidirectional data support on the Switched Port Analyzer (SPAN) port allows the CISCO Secure Intrusion Detection System (IDS) to take action when an intruder is detected. Cabling
10BASE-T ports: RJ-45 connectors, two-pair Category 3, 4, or 5 unshielded twisted-pair (UTP) cabling 10BASE-T PoE ports: RJ-45 connectors, two-pair Category 3, 4, or 5 UTP cabling power pins 1,2 (negative) and 3,6 (positive) 100BASE-TX ports: RJ-45 connectors, two-pair Category 5 UTP cabling 100BASE-TX PoE ports: RJ-45 connectors, two-pair Category 5 UTP cabling, power on pins 1,2 (negative) and 3,6 (positive) 1000BASE-T ports: RJ-45 connectors, four-pair Category 5 UTP cabling 1000BASE-T SFP-based ports: RJ-45 connectors, four-pair Category 5 UTP cabling 1000BASE-SX, -LX/LH, -ZX, and CWDM SFP-based ports: LC fiber connectors (single/multimode fiber) CISCO Catalyst 3560 SFP Interconnect Cable: two-pair shielded cabling, 50 cm Management console port: RJ-45-to-DB-9 cable for PC connections; for terminal connections, use RJ-45- to-DB-25 female data-terminal-equipment (DTE) adaptor (can be ordered separately from CISCO; part number ACS-DSBUASYN=)