Main centres: | 1-3 business days |
Regional areas: | 3-4 business days |
Remote areas: | 3-5 business days |
ITEM COMES FROM COMPANY LIQUIDATION TESTEDÂ .
NOT TESTED, SOLD AS IS
THIS UNIT RETAILS FOR OVER R20 000
The Extreme Networks G3 is a Gigabit Ethernet switch with 3 expansion slots that support 24-port Gigabit Ethernet as well as 2-port and 4-port 10GE I/O modules. With its wire-rate switching and routing capabilities, including IPv6 routing, the G3 is well-suited for dynamic switching/routing environments that require high-density Gigabit Ethernet ports and high-capacity 10GE uplinks. Along with a switch capacity of 384 Gbps, the G3 provides 24 Ethernet ports (either fixed 10/100/1000Base-T or 1 Gbps SFPs). Two of the ports on the 10/100/1000 switches are combo ports, which can be accessed via either the 10/100/1000Base-T or 1 Gbps Small Form-Factor Pluggable (SFP) connectors.
In order to provide a reliable, high-availability network, the G3 offers field-replaceable redundant power supplies and supports Link Aggregation Groups (LAGs), OSPF Equal Cost Multipath and Virtual Router Redundancy Protocol (VRRP). Both the standard and Power over Ethernet (PoE) G3 models support redundant, integral power supplies, which can be configured to operate in either a load-sharing (redundant) or additive power configuration.
In conjunction with its non-blocking architecture, the G3's robust Quality of Service (QoS) features enable strong support for converged multimedia networks, including Voice over IP (VoIP) and video, as well as all types of data-intensive applications. The G3's highly customizable Layer 2/3/4 packet classification capabilities together with its intelligent queuing mechanisms ensure that mission-critical applications receive prioritized access to network resources.
Making use of Extreme Networks' policy capabilities, a network administrator can define distinct roles or profiles that represent specific operational groups within an organization. Each defined role is granted individualized access to specific network services and applications (e.g., manager, employee, guest) and these access privileges remain associated with users as they move across both wired and wireless network access points. Users are authenticated via IEEE 802.1X, MAC address, or web authentication, and then assigned a predefined operational role ensuring that each user has access to appropriate information, thus aligning network resource utilization with business goals and priorities.
PAYMENT DUE WITHIN 48 HOURS OF CLOSE OF AUCTION