В Model
|
В USG6510E
|
В USG6530E
|
Fixed interfaces
|
2 port GE (SFP) + 10 ports GE
|
2 port 10 GE (SFP+) + 10 ports GE
|
Product Model
|
desktop model
|
Disks
|
Optional, expandable map available Micro-SD 128 GB
|
Integrated protections
|
Integration of firewall, VPN, intrusion protection, antivirus protection functions. Data Leak Prevention, Bandwidth Management, DDoS-attacks, filtering URL-addresses and anti-spam function. Global system view for configuration and integrated policy management.
|
Application identification and control
|
Identification of over 500 applications with access control granular down to the application feature level (e.g. differentiation of text and voice messages WeChat). Firewall combines application identification with intrusion prevention, antivirus protection, and data filtering to improve the efficiency and accuracy of threat detection.
|
Identification of over 1,200 applications with access control granular down to the application feature level (e.g. differentiation of text and voice messages WeChat). Firewall combines application identification with intrusion prevention, antivirus protection, and data filtering to improve the efficiency and accuracy of threat detection.
|
Bandwidth Management
|
Control of the bandwidth allocated to a specific user and device with a specific IP address, as well as application identification in order to guarantee the provision of key services and access key users.. Control and management is achieved by limiting the maximum bandwidth, guaranteeing the provision of the minimum bandwidth, applying rules PBR depending on the type of application and changes in application data transfer priorities.
|
Intrusion Prevention and Internet Threat Protection
|
Accurate detection and protection against attacks aimed at using vulnerable places due to the timely receipt of current information about threats. The device protects against threats aimed at a specific website, including from SQL-injections and XSS-attacks.
|
Cloud Management Mode
|
The firewall initiates authentication and registration procedures on the cloud management platform, which simplifies network creation and deployment. Cloud management of a large number of devices is implemented using remote service settings management, monitoring devices, detect and eliminate failure functions.
|
Awareness and understanding of security measures in cloud applications
|
Accurate and differentiated methods of management of cloud corporate applications that meet all modern requirements of enterprises.
|
Log In