ISR4461-V/K9

Payment Options

+971 428 40025

Call for Price

Table 1 shows the quick spec.

 

Model

ISR4461-V/K9

 

Aggregate Throughput 1.5Gbps
Total onboard WAN or LAN 10/100/1000 ports 4
RJ-45-based ports 4
SFP-based ports 4
Enhanced service-module slots 3
Doublewide service-module slots 2
NIM slots 3
OIR (all I/O modules) Yes
Onboard ISC slot 1
Dimensions

(H x W x D)

3.5 x 17.25 x 18.5 in

(88.9 x 438.15 x 469.9 mm)

Rack height 2 Rack Units (2RU)

 

The Modules, Cards, Licenses

Table 2 shows the recommended products.

 

Model Description

MEM-4460-8G

 

8G DRAM (1 DIMM) for Cisco ISR 4460

MEM-4460-16G

 

16G DRAM (1 DIMM) for Cisco ISR 4461

MEM-4460-32G

 

32G DRAM (1 DIMM) for Cisco ISR 4460

MEM-FLSH-8GU16G

 

8G to 16G Flash Memory Upgrade for Cisco ISR 4400

MEM-FLSH-8GU32G

 

8G to 32G Flash Memory Upgrade for Cisco ISR 4460

NIM-1MFT-T1/E1

 

Cisco Fourth-Generation Multiflex Trunk Voice and WAN network interface module

NIM-2MFT-T1/E1

 

2 port Multi-flex Trunk Voice/Clear-channel Data T1/E1 Module

NIM-4MFT-T1/E1

 

Voice/WAN Module (4-port T1/E1)

NIM-8MFT-T1/E1

 

Cisco Fourth-Generation Multiflex Trunk Voice and WAN network interface module

NIM-1CE1T1-PRI

 

Cisco Multiflex Trunk Voice and WAN network interface module

NIM-2CE1T1-PRI

 

Cisco Multiflex Trunk Voice and WAN network interface module

FL-44-HSEC-K9

 

U.S. Export Restriction Compliance license for 4400 series

 

Compare to Similar Items

Table 3 shows the comparison.

Model

 

ISR4461/K9

 

ISR4461-V/K9

 

Bundle

 

None

 

Voice Bundle

 

Aggregate Throughput

 

1.5Gbps

 

1.5Gbps

 

Total onboard WAN or LAN 10/100/1000 ports

 

4

 

4

 

RJ-45-based ports

 

4

 

4

 

SFP-based ports

 

4

 

4

 

Enhanced service-module slots

 

3

 

3

 

Doublewide service-module slots

 

2

 

2

 

NIM slots

 

3

 

3

 

OIR (all I/O modules)

 

Yes

 

Yes

 

Onboard ISC slot

 

1

 

1

 

Related Products

Secure Your Business Before a Cyber Attack Happens

Get a professional cybersecurity assessment and identify vulnerabilities before hackers do.