Specifications

2
WWW.EXTREMENETWORKS.COM
Integrated Application Hosting
Select X465 Series models support Extreme's Integrated
Application Hosting which leverages the switch's
hardware and software design to run onboard applicat
ions without impact ing switch performance. X465
models with a quad-core processor can run a Guest
VM directly on the switch in support third-part y or
customized applications – to meet specific business or
operat ional needs. This can provide addit ional network
insight or enable new network applications without need
for a separate hardware device.
(NOTE: Requires a Core License)
VIM Options for Flexible Uplinks
The X465 supports Versatile Interface Modules (VIMs)
for its uplink ports – in addition to its two dedicated
stacking ports. Each X465 model has a single VIM slot
that can be optionally used for uplinks. VIM options
include both 2 and 4-port modules that support 10Gb,
25Gb and 40Gb data rates. VIM modules with LRM and/
or MACsec support are also available.
Fabric Attach
Fabric Attach on the X465 can be used to automate the
connection to Extreme’s campus-based Fabric Connect
solution. Fabric Attach not only provides zero-touch
edge provisioning, it also allows the X465 to take
advantage of the virtualized services and inherent security
capabilities of the Extreme Fabric Connect infrastructure.
MACsec Link Encryption
The X465 Series supports IEEE 802.1AE MACsec on
its 10/100/1000 access ports, as well as on its modular
uplink ports. MACsec is a hop-by-hop security capability
which encrypts/decrypts packets between connected
switches or devices. As a link-only encryption, the switches
can still apply services to the packet, such as policy or
QoS, without compromising the security of packets
across the link. With support for both 128-bit and 256-bit
Advanced Encryption Standard (AES) support, the X465
provides the most secure link encryption.
Role-Based Policy
The X465 supports role-based policies that can be
centrally administered through the ExtremeControl
policy manager. This policy framework empowers
network administrators to define distinct roles or profiles
to represent specific operational groups that may exist
in an enterprise. Each defined role can then be granted
individualized access to specific network services
or applications – and these access privileges remain
associated with users as they move across both wired
and wireless network access points.