Data Sheet
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 11
Product ID
10/100/1000
Ethernet
Ports
Uplink
Interfaces
Available
PoE
Power
Fanless
Dimensions (H x D x W)
Weight
WS-C2960L-16PS-LL
16
2 SFP
120W
Y
1.73 x 9.45 x 10.56 in. (4.4 x 24 x 26.8 cm)
5.73 lb (2.6 kg)
WS-C2960L-24TS-LL
24
4 SFP
–
Y
1.73 x 9.45 x 17.5 in. (4.4 x 24 x 44.5 cm)
6.61 lb (3.0 kg)
WS-C2960L-24PS-LL
24
4 SFP
195W
Y
1.73 x 10.45 x 17.5 in. (4.4 x 26.5 x 44.5 cm)
7.63 lb (3.46 kg)
WS-C2960L-48TS-LL
48
4 SFP
–
Y
1.73 x 9.45 x 17.5 in. (4.4 x 24 x 44.5 cm)
7.21 lb (3.27 kg)
WS-C2960L-48PS-LL
48
4 SFP
370W
N
1.73 x 11.5 x 17.5 in. (4.4 x 29.2 x 44.5 cm)
10.25 lb (4.65 kg)
Features and Benefits
All Cisco Catalyst 2960-L Series Switches feature a LAN Lite Cisco IOS Software image, providing basic
functionality for small-scale deployments.
For more information about the features included in the LAN Lite feature sets, refer to the Cisco Feature Navigator:
http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp.
Network Security
The Cisco Catalyst 2960-L Series Switches provide a range of security features to limit access to the network and
mitigate threats, including:
●
Comprehensive 802.1x features to control access to the network, including flexible authentication, 802.1x
monitor mode, and RADIUS change of authorization.
●
Multidomain Authentication allows an IP phone and a PC to authenticate on the same switch port while
placing them on appropriate voice and data VLANs.
●
Access Control Lists (ACLs) for IPv6 and IPv4 for security and QoS ACEs:
◦ Port-based ACLs for Layer 2 interfaces allow security policies to be applied on individual switch ports.
●
Secure Shell (SSH) Protocol, Kerberos, and Simple Network Management Protocol Version 3
(SNMPv3) provide network security by encrypting administrator traffic during Telnet and SNMP sessions.
SSH Protocol, Kerberos, and the cryptographic version of SNMPv3 require a special cryptographic software
image because of U.S. export restrictions.
●
Switched Port Analyzer (SPAN), with bidirectional data support, allows Cisco Intrusion Detection System
(IDS) to take action when an intruder is detected.
●
TACACS+ and RADIUS authentication facilitates centralized control of the switch and restricts
unauthorized users from altering the configuration.
●
MAC address notification allows administrators to be notified about users added to or removed from the
network.
●
Multilevel security on console access prevents unauthorized users from altering the switch configuration.
●
Bridge Protocol Data Unit (BPDU) guard shuts down spanning-tree port fast–enabled interfaces when
BPDUs are received to avoid accidental topology loops.
●
Spanning-tree Root Guard (STRG) prevents edge devices not in the network administrator’s control from
becoming Spanning Tree Protocol root nodes.
●
IGMP filtering provides multicast authentication by filtering out nonsubscribers and limits the number of
concurrent multicast streams available per port.