Main Menu

Extreme Networks Summit X460-G2-24t-GE4 Ethernet Switch - 24 Ports - Manageable - TAA Compliant - 3 Layer Supported - Twisted Pair, Optical Fiber - 1U High - Rack-mountable - Lifetime Limited Warranty - TAA Compliance 16716T

Extreme Networks Summit X460-G2-24t-GE4 Ethernet Switch - 24 Ports - Manageable - TAA Compliant - 3 Layer Supported - Twisted Pair, Optical Fiber - 1U High - Rack-mountable - Lifetime Limited Warranty - TAA Compliance 16716T
Brand: Extreme Networks
Part Number: 16716T
Availability: 5 or more
Condition: New
Email Us

Extreme Networks Summit X460-G2-24t-GE4 Ethernet Switch - 24 Ports - Manageable - TAA Compliant - 3 Layer Supported - Twisted Pair, Optical Fiber - 1U High - Rack-mountable - Lifetime Limited Warranty - TAA Compliance

The Summit® X460-G2 series is based on Extreme Networks® revolutionary ExtremeXOS®, a highly resilient OS that providescontinuous uptime, manageability and operational efficiency. Each switch offers the same high-performance, nonblocking hardware technology, in the Extreme Networks tradition of simplifying network deployments through the use of common hardware and software throughout the network. The Summit X460-G2 switches are effective campus edge switches that support Energy Efficient Ethernet (EEE - IEEE 802.3az) with IEEE 802.3at PoE-plus and can also serve as aggregation switches for traditional enterprise networks. The Summit X460-G2 series is also an option for DSLAM or CMTS aggregation, or for active Ethernet access.The Summit X460-G2 can also be used as a top-of-rack switch for many data center environments with features such as high-density Gigabit Ethernet for concentrated data center environments; XNV™ (ExtremeXOS Network Virtualization) for centralized network-based Virtual Machine (VM) inventory, VM location history and VM provisioning; Direct Attach™ to offload VM switching from servers, thereby improving performance; high-capacity Layer 2/Layer 3 scalability for highly virtualized data centers; and intra-rack and cross-rack stacking with industry-leading flexibility.Comprehensive Security Management User policy and host integrity enforcement, and identity management Universal Port Dynamic Security Profiles to provide fine granular security policies in the network Threat detection and response instrumentation to react to network intrusion with CLEAR-Flow Security Rules Engine Denial of Service (DoS) protection and IP security against man-in-the-middle and DoS attacks to harden the network infrastructure Role Based Policy enables support for policy profiles to secure and provision network resources based upon the role the user or device plays within the network.