Firewall Huawei USG6680-DC

SKU
USG6680-DC
Call for Price
EAN: 16530
Stock: available on order
Lead time: 25-35 days
GPL price:

85224 $

USG6680 DC Host(16GE(RJ45)+8GE(SFP)+4*10GE(SFP+).16G Memory.2 DC Power)

In the decisionВ USG6600В implemented a unified mechanism for protecting networks of large and medium-sized enterprises, organizations and data centers.

Integrated firewall features,В VPNВ and intrusion prevention, as well as antivirus and data leakage protection technology provide high-performance traffic processing and analysis. The solution also provides identification of more thanВ 6 300 applications, analysis of service traffic of the internal network by six measurable indicators and automatic issuance of recommendations on security policy.

Series FirewallsВ USG6600В allow you to optimize security management functions and enhance protection at the application layer. DecisionВ USG6600, lab testedВ ICSAВ by categoryВ Firewall, IPS, IPSec, SSL VPN and AV, awarded a certificateВ CCВ with a level of trustВ EAL4+В and received a "recommended" rating from the laboratoryВ NSS.

Specifications of the firewall Huawei USG6680-DC:

Model

USG6712E

USG6716E

Fixed interfaces

2 port 100G (QSFP28) + 2 port 40G (QSFP+) + 20 ports 10 GE (SFP+) + 2 port 10 GE (SFP+) HA + 1 port USB 3.0

form factor

1U

Disks

Discs available for selection SSD (1 2.5 inch drive) 240 GB or HDD (1 2.5 inch drive) 1 Tb

Integrated protections

Support for firewall, VPN, intrusion protection, antivirus protection functions. Data Leak Prevention, Bandwidth Management, DDoS-attacks, filtering URL-addresses and anti-spam function.

Application identification and control

Identification of over 6,000 applications with access control granular down to the application feature level (e.g. differentiation of text and voice messages WeChat). Firewall combines application identification with intrusion prevention, antivirus protection, and data filtering to improve the efficiency and accuracy of threat detection.

Bandwidth Management

Control of the bandwidth allocated to a specific user and device with a specific IP address, as well as application identification in order to guarantee the provision of key services and access key users.. These control methods include limiting the maximum bandwidth, guaranteeing the minimum bandwidth, applying PBR and changing application data transfer priorities.

Intrusion Prevention and Internet Threat Protection

Accurate detection and protection against attacks aimed at using vulnerable places due to the timely receipt of current information about threats. The device protects against threats aimed at a specific website, including from SQL-injections and XSS-attacks.

AAPT

Detection and blocking malicious files by interacting with locally installed or cloud "sandboxВ».
The function of obtaining data from the traffic information collection device and send them to the intellectual cybersecurity system (Cybersecurity Intelligence System; CIS) Provides analysis, assessment and identification of permanent threats of increased complexity (APT).
No need to decrypt the code of encrypted traffic. To detect threats in encrypted traffic, the firewall works with the system CIS.
In addition, this device proactively responds to malicious scanning attempts and, together with CIS-system analyzes system behavior, quickly detects and logs malicious activity, protecting enterprises from threats in real time.

Cloud Management Mode

The firewall initiates authentication and registration procedures on the cloud management platform, which provides automatic configuration and start-up of devices, simplifies the creation and deployment of a network.
Cloud management of a large number of devices is implemented using remote control of service settings, monitoring the operation, detection and elimination functions.

Awareness and understanding of security measures in cloud applications

Accurate and differentiated methods of management of cloud corporate applications that meet all modern requirements of enterprises.

В 

В 

Your Rating