Firewall Huawei USG6680E-AC

SKU
USG6680E-AC
Call for Price
EAN: 16509
Stock: available on order
Lead time: 25-35 days
GPL price:

46500 $

USG6680E AC Host(28*(SFP+)+4*QSFP+2*HA,2AC power supply)

Firewalls Huawei Series USG new generation have an artificial intelligence system, all the necessary protection mechanisms based on software-defined networks and optimization of security policies that reduce network security risks.

Huawei developed a unique series of firewalls USG On the base AI, They provide high intellectual protection of corporate networks from malicious attacks and unauthorized traffic..

Devices are designed for use in medium and large networks of enterprises, educational institutions and new generation data centers. Interacting with other security devices, firewalls USG6600E with functions NGFW proactively protect your network from threats, enhance threat detection at network edges, and eliminate performance degradation issues. The solution provides the ability to search and match by pattern and speed up the processing of encryption operations/decryption, which significantly improves the performance of firewalls, services IPSec and speed of detection of security problems.

Specifications of the firewall Huawei USG6680E-AC:

Model

USG6680E

USG6615E

USG6625E

USG6635E

USG6655E

Fixed interfaces

4В port 40 GE (QSFP+) + 28В ports 10 GE (SFP+) + 2В port 10 GE (SFP+) HA + 1В port USB 3.0

6В ports 10GE (SFP+) + 6В ports GE (SFP) + 16В ports GE

2В port 40GE (QSFP+) + 12В ports 10GE (SFP+) + 16В ports GE

form factor

1U

Disks

Discs available for selection SSD (1 2.5 inch drive) 240 GB or HDD (1 2.5 inch drive) 1 Tb

Integrated protections

Support for firewall, VPN, intrusion protection, antivirus protection functions. Data Leak Prevention, Bandwidth Management, DDoS-attacks, filtering URL-addresses and anti-spam function.

Application identification and control

Identification of over 6,000 applications with access control granular down to the application feature level (e.g. differentiation of text and voice messages WeChat). Firewall combines application identification with intrusion prevention, antivirus protection, and data filtering to improve the efficiency and accuracy of threat detection.

Bandwidth Management

Control of the bandwidth allocated to a specific user and device with a specific IP address, as well as application identification in order to guarantee the provision of key services and access key users.. These control methods include limiting the maximum bandwidth, guaranteeing the minimum bandwidth, applying PBR and changing application data transfer priorities.

Intrusion Prevention and Internet Threat Protection

Accurate detection and protection against attacks aimed at using vulnerable places due to the timely receipt of current information about threats. The device protects against threats aimed at a specific website, including from SQL-injections and XSS-attacks.

AAPT

Detection and blocking malicious files by interacting with locally installed or cloud "sandboxВ».

The function of obtaining data from the traffic information collection device and send them to the intellectual cybersecurity system (Cybersecurity Intelligence System; CIS) Provides analysis, evaluation and identification of complex constant threats (APT).

No need to decrypt the code of encrypted traffic. To detect threats in encrypted traffic, the firewall works with the system CIS.

In addition, this device proactively responds to malicious scanning attempts and, together with CIS-system analyzes system behavior, quickly detects and logs malicious activity, protecting enterprises from threats in real time.

Cloud Management Mode

The firewall initiates authentication and registration procedures on the cloud management platform, which provides automatic configuration and start-up of devices, simplifies the creation and deployment of a network.

Cloud management of a large number of devices is implemented using remote control of service settings, monitoring the operation, detection and elimination functions.

Awareness and understanding of security measures in cloud applications

Accurate and differentiated methods of management of cloud corporate applications that meet all modern requirements of enterprises.

В 

В 

В 

В 


Your Rating