\t | \t | \t | \t | \t |
\t Fixed interface | \t | \t |
\t Expansion slot | \t | \t |
\t Interface Module Type | \t | \t WSIC: 2×10GE(SFP+)+8×GE(RJ45), 8×GE(RJ45), 8×GE(SFP), 4×GE(RJ45)BYPASS |
\t Product form | \t | \t |
\t Dimensions (W × D × H) mm | \t | \t |
\t Full weight | \t | \t |
\t HDD | \t | \t optional 300GB single hard disk, hot swappable |
\t Redundant power supply | \t External adapter | \t Optional |
\t Power supply AC | \t |
\t Power supply DC | \t | \t |
\t Maximum power | \t | \t |
\t Working environment | \t Temperature:0°C to 40°C Humidity: 10% to 90% | \t Temperature: 0~45°C (without hard disk)/5°C~40°C (including hard disk) Humidity: 10%~90% |
\t Non-working environment | \t Temperature: -40 ° C ~ 70 ° C / humidity: 5% ~ 95% |
\t Context Awareness | \t Global awareness based on application, content, time, users, threats, and location. |
\t 8 user authentications (local, RADIUS, Hwtacacs, SecureID, AD, CA, LDAP, EndPoint Security) |
\t Application security | \t 6000+ application protocol identification, identification granularity refinement to specific actions, online protocol library upgrade |
\t Application identification combined with virus scanning reveals viruses, trojans and malware hidden in the application that can detect more than 5 million viruses |
\t Application identification combined with content detection to discover file types and sensitive information in applications to prevent sensitive information from leaking
|
\t Intrusion Prevention | \t Based on feature detection, it supports attack detection and defense with more than 3500 features |
\t Based on protocol detection, support protocol self-identification, based on protocol anomaly detection |
\t Support for custom IPS signatures |
\t Web Security | \t Cloud-based URL classification filtering, supporting 85 million URL libraries, 80+ classification |
\t Web attack protection, such as cross-site scripting attacks, SQL injection attacks |
\t Web virus protection, providing HTTP/HTTPS/FTP based content and virus detection |
\t URL black and white list and keyword filtering |
\t Email security | \t Real-time anti-spam function, online detection, protection against phishing emails |
\t Local black and white list, remote real-time blacklist, content filtering, keyword filtering, attachment type, size, quantity |
\t Support POP3/SMTP/IMAP protocol for virus detection, virus check and security reminder for email attachments |
\t Data Security | \t Based on content-aware data anti-leakage, identify and filter transmitted files and content |
\t 30+ file restore and content filtering, such as Word, Excel, PPT, PDF, etc.), 120+ file type filtering |
\t Security Virtualization | \t Full security features virtualization, forwarding virtualization, user virtualization, management virtualization, view virtualization, resource virtualization (bandwidth, sessions, etc.) |
\t Network security | \t DDoS attack protection against 10+ DDoS attacks such as SYN flood and UDP flood |
\t Rich VPN features, IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, GRE, etc |
\t Routing characteristics | \t IPv4: static route, RIP, OSPF, BGP, IS-IS |
\t IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6RD, ACL6 |
\t Deployment and reliability | \t Transparent, routing, hybrid deployment mode, support for main/master, active/standby HA features |
\t Intelligent Management | \t Evaluate network risks based on traffic passing through the device, intelligently give suggested strategies, and implement self-optimization of security policies. Support policy hit rate analysis, support for policy conflicts and redundancy detection. Consolidate redundancy strategies to simplify management |
\t Global configuration view and integrated policy management, configuration can be done in one page |
\t Visualize multi-dimensional report presentation, support multi-dimensional presentation of users, applications, content, time, traffic, threats, URLs, etc |