Новый брандмауэр Huawei Usg6300 следующего поколения Usg63

Сохранить в закладки 60813926427:


Цена:*

Количество:

  • В избранное

Описание и отзывы

Характеристики


Product Description
Huawei USG6300
It provides high-performance, comprehensive next-generation security protection for SOHO enterprises, chain organizations, business outlets, small and medium-sized enterprises, and branch offices of enterprises. This series of products integrates functions such as firewall, IPS, AV, VPN, and online behavior management to provide a secure, flexible and convenient integrated networking and access solution.

Key characteristics

The most accurate application access control

Comprehensive and innovative next-generation environment awareness and access control. Globally perceives an increasing number of application-layer threats through a combination of six dimensions: application, content, time, users, threats, and location. The industry's most 6000+ application identification, fine-grained application layer security protection.

Rich reports visualize business status, network environment, security posture, user behavior, etc., allowing users to sense and operate safely.

Deep integration of next-generation content security. Through the merging of the parsing engine, the security capability is deeply integrated with the application identification, and the malicious code embedding, network intrusion, data theft, APT attack and the like by the application are prevented.





The simplest security management

Provide policy templates based on application scenarios to implement rapid policy deployment.

According to the actual traffic and application risks in the network, the policy optimization proposal is automatically generated following the principle of minimum privilege control.

Analyze the strategy hit rate, find redundant and invalid strategies, effectively control the scale of the strategy, and simplify management.





Highest performance experience

Dedicated hardware and software platform architecture, IAE single parsing engine. After the IntelliSense application information, the full security features are processed in parallel.

Content detection hardware acceleration, improve application layer protection efficiency, and ensure that the full security feature can still maintain optimal performance.





The most comprehensive protection against unknown threats

A global security center with a rich source of suspicious samples. The cloud uses sandbox technology to monitor the behavior of suspicious samples in a simulated environment and efficiently discover unknown threats.

Automatically extract threat characteristics after discovering unknown threats, and quickly synchronize features to the device side to effectively prevent zero-day attacks.
\t
Model
\t
USG6320
\t
USG6370
\t
USG6380
\t
USG6390
\t
Fixed interface
\t
8GE
\t
8GE+4SFP
\t
Expansion slot
\t
-
\t
2*WSIC
\t
Interface Module Type
\t
-
\t
WSIC: 2×10GE(SFP+)+8×GE(RJ45), 8×GE(RJ45), 8×GE(SFP), 4×GE(RJ45)BYPASS
\t
Product form 
\t
Desktop
\t
1 U
\t
Dimensions (W × D × H) mm
\t
300 × 220 × 44.5
\t
442 × 421 × 43.6
\t
Full weight
\t
1.7kg
\t
10kg
\t
HDD
\t
\t
optional 300GB single hard disk, hot swappable
\t
Redundant power supply
\t
External adapter
\t
Optional
\t
Power supply AC
\t
100 ~ 240V
\t
Power supply DC
\t
-
\t
-48 ~ -60V
\t
Maximum power
\t
60W
\t
170W
\t
Working environment 
\t
Temperature:0°C to 40°C Humidity: 10% to 90%
\t
Temperature: 0~45°C (without hard disk)/5°C~40°C (including hard disk) Humidity: 10%~90%
\t
Non-working environment
\t
Temperature: -40 ° C ~ 70 ° C / humidity: 5% ~ 95%
\t
Context Awareness
\t
Global awareness based on application, content, time, users, threats, and location.
\t
8 user authentications (local, RADIUS, Hwtacacs, SecureID, AD, CA, LDAP, EndPoint Security)
\t
Application security
\t
6000+ application protocol identification, identification granularity refinement to specific actions, online protocol library upgrade
\t
Application identification combined with virus scanning reveals viruses, trojans and malware hidden in the application that can detect more than 5 million viruses
\t
Application identification combined with content detection to discover file types and sensitive information in applications to prevent sensitive information from leaking
\t
Intrusion Prevention 
\t
Based on feature detection, it supports attack detection and defense with more than 3500 features
\t
Based on protocol detection, support protocol self-identification, based on protocol anomaly detection
\t
Support for custom IPS signatures
\t
Web Security
\t
Cloud-based URL classification filtering, supporting 85 million URL libraries, 80+ classification
\t
Web attack protection, such as cross-site scripting attacks, SQL injection attacks
\t
Web virus protection, providing HTTP/HTTPS/FTP based content and virus detection
\t
URL black and white list and keyword filtering
\t
Email security
\t
Real-time anti-spam function, online detection, protection against phishing emails
\t
Local black and white list, remote real-time blacklist, content filtering, keyword filtering, attachment type, size, quantity
\t
Support POP3/SMTP/IMAP protocol for virus detection, virus check and security reminder for email attachments
\t
Data Security
\t
Based on content-aware data anti-leakage, identify and filter transmitted files and content
\t
30+ file restore and content filtering, such as Word, Excel, PPT, PDF, etc.), 120+ file type filtering
\t
Security Virtualization
\t
Full security features virtualization, forwarding virtualization, user virtualization, management virtualization, view virtualization, resource virtualization (bandwidth, sessions, etc.)
\t
Network security
\t
DDoS attack protection against 10+ DDoS attacks such as SYN flood and UDP flood
\t
Rich VPN features, IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, GRE, etc
\t
Routing characteristics
\t
IPv4: static route, RIP, OSPF, BGP, IS-IS
\t
IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6RD, ACL6
\t
Deployment and reliability
\t
Transparent, routing, hybrid deployment mode, support for main/master, active/standby HA features
\t
Intelligent Management
\t
Evaluate network risks based on traffic passing through the device, intelligently give suggested strategies, and implement self-optimization of security policies. Support policy hit rate analysis, support for policy conflicts and redundancy detection. Consolidate redundancy strategies to simplify management
\t
Global configuration view and integrated policy management, configuration can be done in one page
\t
Visualize multi-dimensional report presentation, support multi-dimensional presentation of users, applications, content, time, traffic, threats, URLs, etc
Related Products

Good quality

Good price


Good service

Our Company

We are the central government procurement supplier in China and all products are of high quality.

Shanghai Qingfei Electronic Technology CO., LTD is a high-tech information system integration enterprise,which focuses on providing comprehensive information solutions, software and hardware products development and sales and technical services as the core business.

Certifications
Packing & Delivery

Packing

Original Huawei packaging,new original Huawei box and outer box in CTN packaging

Delivery

Port

Shanghai,Beijing,Tianjing,Shenzhen

Lead Time :

Shipped in 1~5 days after payment

Похожие товары

Новые поступления

Новинки товаров от производителей по оптовым ценам