Main Menu

Extreme Networks Summit X460-G2-24x-10GE4 Ethernet Switch - 8 Ports - Manageable - TAA Compliant - 3 Layer Supported - Modular - Twisted Pair, Optical Fiber - 1U High - Rack-mountable - TAA Compliance 16705T

Extreme Networks Summit X460-G2-24x-10GE4 Ethernet Switch - 8 Ports - Manageable - TAA Compliant - 3 Layer Supported - Modular - Twisted Pair, Optical Fiber - 1U High - Rack-mountable - TAA Compliance 16705T
Brand: Extreme Networks
Part Number: 16705T
Availability: 5 or more
Condition: New
Email Us

Extreme Networks Summit X460-G2-24x-10GE4 Ethernet Switch - 8 Ports - Manageable - TAA Compliant - 3 Layer Supported - Modular - Twisted Pair, Optical Fiber - 1U High - Rack-mountable - TAA Compliance

The X460-G2 series is based on Extreme Networks revolutionary ExtremeXOS, a highly resilient OS that provides continuous uptime, manageability and operational efficiency. Each switch offers the same high-performance, non-blocking hardware technology, in the Extreme Networks tradition of simplifying network deployments through the use of common hardware and software throughout the network. The X460-G2 switches are effective campus edge switches that support Energy Efficient Ethernet (EEE - IEEE 802.3az) with IEEE 802.3at PoE-plus and can also serve as aggregation switches for traditional enterprise networks. The X460-G2 series is also an option for DSLAM or CMTS aggregation, or for active Ethernet access. The X460-G2 can also be used as a top-of-rack switch for many data center environments with features such as high-density Gigabit Ethernet for concentrated data center environments; XNVTM (ExtremeXOS Network Virtualization) for centralized network-based Virtual Machine (VM) inventory, VM location history and VM provisioning; Direct AttachTM to offload VM switching from servers, thereby improving performance; high-capacity Layer 2/Layer 3 scalability for highly virtualized data centers; and intra-rack and cross-rack stacking with industry-leading flexibility. Comprehensive Security Management User policy and host integrity enforcement, and identity management Universal Port Dynamic Security Profiles to provide fine granular security policies in the network Threat detection and response instrumentation to react to network intrusion with CLEAR-Flow Security Rules Engine Denial of Service (DoS) protection and IP security against man-in-the-middle and DoS attacks to harden the network infrastructure Role Based Policy enables support for policy profiles to secure and provision network resources based upon the role the user or device plays within the network