HPE Sourcing Ethernet 10/25Gb 2-Port 621SFP28 Adapter

  • Part: 2365376
$582.00

Availability

Out of Stock

  • General Information
    • Manufacturer
    • Hewlett Packard Enterprise
    • Manufacturer Website Address
    • http://www.hpe.com
    • Brand Name
    • HPE
    • Product Type
    • 25Gigabit Ethernet Card

Do you want to increase bandwidth and improve performance while reducing costs? The HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter supports 10GbE and 25GbE bandwidth capability which allows more network traffic and speed up network-intensive applications. Compared to a 10G implementation this adapter provides 150% more bandwidth with just a minimal price delta. This adapter has been designed to efficiently deliver high performance and low latency by offloading processing of Ethernet packets on the adapter. Freeing up CPU resources in the host allowing it to do more important tasks.

Features

Improving CPU Utilization with Lower Latency

The HPE Ethernet 10/25Gb 2-port 621 Adapter reduces CPU Utilization and helps improve host VM density and server efficiency using remote direct memory access (RDMA) over Converged Ethernet (RoCE v2) for Live Migration, Microsoft SMB Direct environments.

Delivers single root I/O virtualization (SR-IOV) with the ability to run a large number of virtual machines (VMs) per server, which reduces the need for hardware and the resultant costs of space and power required by hardware devices.

Enhance Performance and Lower Power Consumption

The HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter allows customers to use overlay networking which increases VM migration flexibility with minimal impact to performance and lower power usage with Tunnel Offloads (VXLAN and NVGRE).

Speeds up packet processing to service more I/O requests utilizing data plane development packet (DPDK).

Prevent Unauthorized Access

The HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter stops unauthorized access to memory or storage with device-level firewall. This enforces that on-device firmware and configuration data can only be accessed by authorized agents.

Provides traceability into authenticated firmware updates by capturing changes in standard system logs.

Renders user and configuration data on the NIC irretrievable so that NICs can be safely repurposed or disposed of.

You Might Also Like