Out of stock
This item is currently out of stock and it may or may not be restocked.
Sold by Newegg

Shipped by Newegg

Shop it at NeweggBusiness.

Extreme Networks, Inc 16701 X460-G2-24t-10GE4 Base Unit

Overview
Specs
Reviews
avatar

Any questions? Our AI beta will help you find out quickly.

  • The Summit® X460-G2 series is based on Extreme Networks® revolutionary Extreme
    XOS®, a highly resilient OS that providescontinuous uptime, manageability and operational efficiency. Each switch offers the same high-performance, nonblocking hardware technology, in the Extreme Networks tradition of simplifying network deployments through the use of common hardware and software throughout the network.

    The Summit X460-G2 switches are effective campus edge switches that support Energy Efficient Ethernet (EEE - IEEE 802.3 az) with IEEE 802.3 at PoE-plus and can also serve as aggregation switches for traditional enterprise networks. The Summit X460-G2 series is also an option for DSLAM or CMTS aggregation, or for active Ethernet access.

    The Summit X460-G2 can also be used as a top-of-rack switch for many data center environments with features such as high-density Gigabit Ethernet for concentrated data center environments; XNV™ (Extreme
    XOS Network Virtualization) for centralized network-based Virtual Machine (VM) inventory, VM location history and VM provisioning; Direct Attach™ to offload VM switching from servers, thereby improving performance; high-capacity Layer 2/Layer 3 scalability for highly virtualized data centers; and intra-rack and cross-rack stacking with industry-leading flexibility.

    Comprehensive Security Management
    • User policy and host integrity enforcement, and identity management
    • Universal Port Dynamic Security Profiles to provide fine granular security policies in the network
    • Threat detection and response instrumentation to react to network intrusion with CLEAR-Flow Security Rules Engine
    • Denial of Service (DoS) protection and IP security against man-in-the-middle and DoS attacks to harden the network infrastructure
    • Role Based Policy enables support for policy profiles to secure and provision network resources based upon the role the user or device plays within the network.

Warranty & Returns

Warranty, Returns, And Additional Information

Return Policies

Manufacturer Contact Info

LOADING...