







GWN7806(P)
Enterprise-Grade Layer 2+ Managed Network Switch
The GWN7806(P) is a high-performance layer 2+ managed network switch with 48 ports that allows small-to-medium enterprises to build scalable, secure, and smart business networks that are fully manageable
- 48 Gigabit Ethernet ports and 6 Gigabit SFP+ ports
- Smart power control to support dynamic PoE/PoE+ power allocation per port for the PoE models
- Supports deployment in IPv6 and IPv4 networks
- Reliability features including fault detection, device protection, dual boot, dual system file redundancy, link aggregation, storm control, and more
- ARP Inspection, IP Source Guard, DoS protection, port security & DHCP snooping
- Embedded controller to manage switch; GWN.Cloud and GWN Manager, Grandstream’s cloud and on-premise Wi-Fi management platform
- Built-in QoS allows for prioritization of network traffic
- Supports stacking (pending) for easy management of up to 16 switches in one interface while creating redundant backup between multiple devices
Free Network Management Options Module

GDMS Networking
GDMS Networking is an enterprise-grade, cloud management platform for Grandstream networking products.

GWN Manager
GWN Manager is an on-premise enterprise- grade, management platform for an unlimited number of Grandstream networking products.

Embedded Controller
Grandstream’s GWN networking products include an embedded controller software and is built-in to the product’s web user interface.
Product Highlights
Powerfull Processing Capabilities
Grandstream’s GWN7806(P) Layer 2+ managed network switch comes with powerful processing capabilities to ensure a high-performance backbone for any network.
- Unicast routing via ACL for data communication routing between different network segments. Supports DHCP Server and Relay to assign IP addresses to hosts within the network.
- GVRP for VLAN dynamic distribution, registration, and attribute propagation, to reduce the amount of manual configuration and ensure the correctness of configuration.
- QoS, including Port Priority, Priority Mapping, Queue Scheduling, Traffic Shaping, and Rate Limit.
- ACL is used to recognize the filtering of data packets by configuring matching rules, processing operations and time schedule, and providing flexible security access control policies.
