Model
|
USG6680E
|
USG6615E
|
USG6625E
|
USG6635E
|
USG6655E
|
Fixed interfaces
|
4В port 40 GE (QSFP+) + 28В ports 10 GE (SFP+) + 2В port 10 GE (SFP+) HA + 1В port USB 3.0
|
6В ports 10GE (SFP+) + 6В ports GE (SFP) + 16В ports GE
|
2В port 40GE (QSFP+) + 12В ports 10GE (SFP+) + 16В ports GE
|
form factor
|
1U
|
Disks
|
Discs available for selection SSD (1 2.5 inch drive) 240 GB or HDD (1 2.5 inch drive) 1 Tb
|
Integrated protections
|
Support for firewall, VPN, intrusion protection, antivirus protection functions. Data Leak Prevention, Bandwidth Management, DDoS-attacks, filtering URL-addresses and anti-spam function.
|
Application identification and control
|
Identification of over 6,000 applications with access control granular down to the application feature level (e.g. differentiation of text and voice messages WeChat). Firewall combines application identification with intrusion prevention, antivirus protection, and data filtering to improve the efficiency and accuracy of threat detection.
|
Bandwidth Management
|
Control of the bandwidth allocated to a specific user and device with a specific IP address, as well as application identification in order to guarantee the provision of key services and access key users.. These control methods include limiting the maximum bandwidth, guaranteeing the minimum bandwidth, applying PBR and changing application data transfer priorities.
|
Intrusion Prevention and Internet Threat Protection
|
Accurate detection and protection against attacks aimed at using vulnerable places due to the timely receipt of current information about threats. The device protects against threats aimed at a specific website, including from SQL-injections and XSS-attacks.
|
AAPT
|
Detection and blocking malicious files by interacting with locally installed or cloud "sandboxВ».
|
The function of obtaining data from the traffic information collection device and send them to the intellectual cybersecurity system (Cybersecurity Intelligence System; CIS) Provides analysis, evaluation and identification of complex constant threats (APT).
|
No need to decrypt the code of encrypted traffic. To detect threats in encrypted traffic, the firewall works with the system CIS.
|
In addition, this device proactively responds to malicious scanning attempts and, together with CIS-system analyzes system behavior, quickly detects and logs malicious activity, protecting enterprises from threats in real time.
|
Cloud Management Mode
|
The firewall initiates authentication and registration procedures on the cloud management platform, which provides automatic configuration and start-up of devices, simplifies the creation and deployment of a network.
|
Cloud management of a large number of devices is implemented using remote control of service settings, monitoring the operation, detection and elimination functions.
|
Awareness and understanding of security measures in cloud applications
|
Accurate and differentiated methods of management of cloud corporate applications that meet all modern requirements of enterprises.
|
Log In